搜索结果: 1-15 共查到“军队指挥学 Asynchronous”相关记录40条 . 查询时间(0.062 秒)
Bootstrapping Consensus Without Trusted Setup: Fully Asynchronous Distributed Key Generation
threshold cryptography distributed cryptography asynchronous consensus
2019/9/16
In this paper, we present the first fully asynchronous distributed key generation (ADKG) algorithm as well as the first distributed key generation algorithm that can create keys with a dual (f,2f+1)...
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
Blockchain Smart Contracts Cryptocurrency
2019/7/22
Smart contracts are programmable, decentralized and transparent financial applications. Because smart contract platforms typically support Turing-complete programming languages, such systems are often...
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees
cryptographic protocols Byzantine agreement
2019/6/13
Typically, protocols for Byzantine agreement (BA) are designed to run in either a synchronous network (where all messages are guaranteed to be delivered within some known time ΔΔ from when they are se...
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones
Blockchain Sharding Atomicity Parallel Security
2019/3/6
Cryptocurrencies have provided a promising infrastructure for pseudonymous online payments. However, low throughput has significantly hindered the scalability and usability of cryptocurrency systems f...
Robust MPC: Asynchronous Responsiveness yet Synchronous Security
secure multiparty computation byzantine agreement synchronous
2019/2/25
Two paradigms for secure MPC are synchronous and asynchronous protocols, which differ substantially in terms of the guarantees they provide. While synchronous protocols tolerate more corruptions and a...
Bidirectional Asynchronous Ratcheted Key Agreement without Key-Update Primitives
secure communication post-compromise security ratchet
2018/11/9
Following up mass surveillance and privacy issues, modern secure communication protocols now seek for more security such as forward secrecy and post-compromise security. They cannot rely on any assump...
The problem of Byzantine Agreement (BA) is of interest to both distributed computing and cryptography community. Following well-known results from the distributed computing literature, BA problem in t...
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds
cryptographic protocols Byzantine agreement
2018/3/9
In the problem of byzantine agreement (BA), a set of n parties wishes to agree on a value v by jointly running a distributed protocol. The protocol is deemed secure if it achieves this goal in spite o...
A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks
SMR BA
2018/1/17
The recent advent of blockchains has spurred a huge interest in the research and development of numerous cryptocurrencies as well as understanding the fundamental concepts that underly this technology...
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls
Scalar Multiplication Scalar Splitting Scalar Blinding
2017/10/9
In recent years, performance counters have been used as a side channel source for the branch mispredictions which has been used to attack ciphers with user privileges. However, existing research consi...
The client-server architecture is one of the most widely used in Internet for its simplicity and flexibility. In practice the server is assigned a public address so that its services can be consumed.T...
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
cryptographic protocols proof-of-concept implementation
2017/7/6
In the past few years secure messaging has become mainstream, with over a billion active users of end-to-end encryption protocols through apps such as WhatsApp, Signal, Facebook Messenger, Google Allo...
Analysis of the Blockchain Protocol in Asynchronous Networks
blockchain Nakamoto consensus
2016/5/11
Nakamoto's famous blockchain protocol enables achieving consensus in a so-called \emph{permissionless setting}---anyone can join (or leave) the protocol execution, and the protocol instructions do not...
Constant-Round Asynchronous Multi-Party Computation
Multi-Party Computation Constant-Round Protocols Asynchronous Model
2016/2/26
Secure multi-party computation (MPC) allows several mutually distrustful parties to securely
compute a joint function of their inputs and exists in two main variants: In synchronous MPC
parties are ...
Asynchronous Secure Multiparty Computation in Constant Time
multiparty computation asynchronous communication threshold FHE
2016/1/26
In the setting of secure multiparty computation, a set of mutually distrusting parties wish
to securely compute a joint function. It is well known that if the communication model is
asynchronous, me...