搜索结果: 1-4 共查到“军事学 Erasure”相关记录4条 . 查询时间(0.109 秒)
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
Oblivious transfer generalized erasure channel oblivious transfer capacity
2016/1/6
Noisy channels are a powerful resource for cryptography as they can be
used to obtain information-theoretically secure key agreement, commitment
and oblivious transfer protocols, among others. Obliv...
Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel
Code based cryptography Polar codes
2014/3/11
This paper proposes an efficient secret key cryptosystem based on polar codes over Binary Erasure Channel. We introduce a method, for the first time to our knowledge, to hide the generator matrix of t...
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious
Information-theoretic security oblivious transfer oblivious transfer capacity
2009/12/29
Information-theoretically secure string oblivious transfer (OT) can be
constructed based on discrete memoryless channel (DMC). The oblivious
transfer capacity of a channel characterizes – similarly ...
Making Collusion-Secure Codes (More) Robust against Bit Erasure
Collusion-secure code bit erasure tolerance general conversion
2009/11/18
A collusion-secure code is called robust if it is secure against erasure of a limited number of undetectable
bits, in addition to collusion attacks under Marking Assumption. In this article, we propo...