搜索结果: 1-7 共查到“Towards Efficient”相关记录7条 . 查询时间(0.093 秒)
Towards Efficient Private Distributed Computation on Unbounded Input Streams
cryptographic protocols Secure-Multi-Party-Computation'Streamin Input
2013/4/18
In the problem of private ``swarm'' computing, $n$ agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of t...
Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
Integrity Check Dynamic Database Outsource SQL Query Authenticated Data Structure Cloud Storage
2013/2/21
With the rising trend of outsourcing databases to the cloud, it is important to allow clients to securely verify that their queries on the outsourced databases are correctly executed by the cloud. Exi...
Towards Efficient Provable Data Possession
cryptographic protocols / Cloud Storage, Provable Data Possession, Proofs of Retrievability Remote Data Integrity Check Homomorphic Authentication Tag RSA Factorization Problem
2012/3/21
Provable Data Possession (\PDP) allows data owner to periodically and remotely audit their data stored in a cloud storage, without retrieving the file and without keeping a local copy. Ateniese~\emph{...
Towards Efficient Provable Data Possession
cryptographic protocols / Cloud Storage Provable Data Possession Proofs of Retrievability Remote Data Integrity Check Homomorphic Authentication Tag RSA Factorization Problem
2012/3/23
Provable Data Possession (\PDP) allows data owner to periodically and remotely audit their data stored in a cloud storage, without retrieving the file and without keeping a local copy. Ateniese~\emph{...
Towards Efficient Provable Data Possession
cryptographic protocols / Cloud Storage Provable Data Possession Proofs of Retrievability Remote Data Integrity Check Homomorphic Authentication Tag RSA Factorization Problem
2012/3/23
Provable Data Possession (\PDP) allows data owner to periodically and remotely audit their data stored in a cloud storage, without retrieving the file and without keeping a local copy. Ateniese~\emph{...
Towards Efficient Provable Data Possession
public-key cryptography / Public key cryptosystem Error-correcting code Code based PKC Cyclic code Multivariate PKC Gr鯾 ner bases Rank attack PQC.
2012/3/23
In this paper, we present a new class of multivariate public-key cryptosystems, K(XIII)SE(2)PKC realizing the coding rate of exactly 1.0, based on random pseudo cyclic codes. The K(XIII)SE(2)PKC is co...
Towards Efficient Phase Unwrapping.