搜索结果: 1-13 共查到“军队指挥学 mixing”相关记录13条 . 查询时间(0.015 秒)
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
Cryptocurrency Cryptographic protocol Privacy
2019/5/28
Many cryptocurrencies, such as Bitcoin and Ethereum, do not provide any financial privacy to their users. These systems cannot be used as a medium of exchange as long as they are transparent. Therefor...
MixEth: efficient, trustless coin mixing service for Ethereum
Cryptography Verifiable shuffle Anonymity
2019/4/3
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains. MixEth doe...
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
MPC Garbled Circuits Secret Sharing
2019/3/1
There are two main ways of performing computation on private data: one method uses linear secret-sharing, in which additions require no communication and multiplications require two secrets to be broa...
Mixing Networks are protocols that allow a set of senders to send messages anonymously. Such protocols are fundamental building blocks to achieve privacy in a variety of applications, such as anonymou...
Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin
cryptocurrencies coin mixing anonymity
2017/3/13
The public nature of the blockchain has been shown to be a severe threat for the privacy of Bitcoin users. Even worse, since funds can be tracked and tainted, no two coins are equal, and fungibility, ...
P2P Mixing and Unlinkable Bitcoin Transactions
anonymity mixing DC-nets crypto-currencies
2016/12/10
Starting with Dining Cryptographers networks (DC-net), several peer-to-peer (P2P) anonymous communication protocols have been proposed. Despite their strong anonymity guarantees none of those has been...
cMix is a cryptographic protocol for mix networks that uses precomputations of a group-homomorphic encryption function to avoid all real-time public-key operations by the senders, mix nodes, and recei...
Encrypt-Mix-Encrypt is a type of SPRP based construction,
where a masked plaintext is encrypted in ECB mode of, then a non-linear
mixing is performed and then again an encryption is performed in ECB...
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
tweakable block cipher iterated Even-Mansour cipher key-alternating cipher
2015/12/23
The iterated Even-Mansour construction defines a block cipher from a tuple of public $n$-bit permutations $(P_1,\ldots,P_r)$ by alternatively xoring some $n$-bit round key $k_i$, $i=0,\ldots,r$, and a...
Key Mixing in Block Ciphers through Addition modulo $2^n$
Key Mixing Block Ciphers Addition modulo
2009/3/12
Key Mixing in Block Ciphers through Addition modulo $2^n$.
Mixing properties of triangular feedback shift registers
Mixing properties triangular feedback shift registers
2009/1/12
The purpose of this note is to show that Markov chains induced by nonsingular
triangular feedback shift registers and non-degenerate sources are
rapidly mixing. The results may directly be applied t...
MV3: A new word based stream cipher using rapid mixing and revolving buffers
stream cipher random walks expander graph
2008/12/22
mv3 is a new word based stream cipher for encrypting long
streams of data. A direct adaptation of a byte based cipher such as rc4
into a 32- or 64-bit word version will obviously need vast amounts o...