搜索结果: 1-15 共查到“军事学 Rational”相关记录37条 . 查询时间(0.084 秒)
Sucker punch makes you richer: The threat of rational miners
blockchain double-spending attack incentive
2019/6/26
Honest majority is a vital assumption of Bitcoin-style blockchains. However, recent 51% attacks render this assumption unrealistic in practice. In this paper, we analyse two possible 51% attacks launc...
Temporary Censorship Attacks in the Presence of Rational Miners
blockchain samrt contract bribery
2019/6/26
Smart contracts allow for exchange of coins according to program rules. While it is well known that so called bribery contracts can influence the incentive mechanism of a Nakamotostyle consensus, we p...
On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography
Montgomery curves Edwards curves Kummer lines
2018/11/16
A paper by Karati and Sarkar at Asiacrypt'17 has pointed out the potential for Kummer lines in genus one, by observing that its SIMD-friendly arithmetic is competitive with the status quo. A more rece...
Weak Compression and (In)security of Rational Proofs of Storage
information theory proofs of storage rational security
2018/5/28
We point out an implicit unproven assumption underlying the security of rational proofs of storage that is related to a concept we call weak randomized compression.
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Blockchain Protocols Rational Protocol Design Bitcoin
2018/2/8
An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure ...
Parameterization of Edwards curves on the rational field Q with given torsion subgroups
Edwards curve twisted Edwards curve torsion subgroups
2018/1/29
This paper presents the basic concepts of the Edwards curves, twisted Edwards curves and the point addition laws on these curves. The main result is the parameterization of the Edward curve with the g...
Trust models are widely used in various computer science disciplines. The main purpose of a trust model is to continuously measure trustworthiness of a set of entities based on their behaviors. In thi...
Perfectly Secure Message Transmission Scheme against Rational Adversaries
secure message transmission game theory rational adversary
2017/4/12
Secure Message Transmission (SMT) is a two-party cryptographic scheme by which a sender securely and reliably sends messages to a receiver using nn channels. Suppose that an adversary corrupts at most...
Rational Proofs against Rational Verifiers
rational proof delegation of computation game theory
2017/3/27
Rational proofs, introduced by Azar and Micali (STOC 2012), are a variant of interactive proofs in which the prover is rational, and may deviate from the protocol for increasing his reward. Guo et al....
Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions
Cryptocurrencies Bitcoin Blockchain
2016/12/9
We present a radical solution to the two foremost challenges facing ``blockchain''-based cryptocurrencies: (1) ``mining pool'' oligopolies and (2) incompressibility of delays affecting validation. Bot...
Accelerating Homomorphic Computations on Rational Numbers
Fully Homomorphic Encryption Encoding Confidential Machine Learning
2016/7/7
Fully Homomorphic Encryption (FHE) schemes are conceptually very powerful tools for outsourcing computations on confidential data. However, experience shows that FHE-based solutions are not sufficient...
Encoding Rational Numbers for FHE-based Applications
Continued fractions Gosper algorithm Rational numbers
2016/4/6
This work addresses a basic problem of security systems that operate on very sensitive
information, such as healthcare data. Specifically, we are interested in the problem of privately
handling medi...
Proofs of Space-Time and Rational Proofs of Storage
proofs of work proofs of space bitcoin
2016/1/27
We introduce a new cryptographic primitive: Proofs of SpaceTime
(PoSTs) and construct a practical protocol for implementing these
proofs. A PoST allows a prover to convince a verifier that she spent...
SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers
trap-door function bi-permutations quasigroup transformations
2016/1/7
In this paper we define a trapdoor function called SBIM(Q) by using multivariate polynomials over the field of rational numbers Q. The public key consists of 2n multivariate polynomials with 3n variab...
Rational proofs, introduced by Azar and Micali (STOC 2012) are a
variant of interactive proofs in which the prover is neither honest nor malicious, but
rather rational. The advantage of rational pro...