搜索结果: 1-6 共查到“军事学 Linear Programming”相关记录6条 . 查询时间(0.066 秒)
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
Secret sharing Information inequalities Rank inequalities
2017/9/25
We present a new improvement in the Linear Programming technique to derive bounds on information theoretic problems. In our case, we deal with the search for lower bounds on the information ratio of s...
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography
public-key cryptography zero-knowledge efficiency
2016/5/9
These protocols are constructed by introducing a bias in the challenge send by the prover. This bias is chosen so as to maximize the security versus effort trade-off. We illustrate the benefits of thi...
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
secret sharing threshold cryptography zero knowledge
2015/12/31
For many applications of secure multiparty computation it is natural to demand that the output of the protocol is verifiable. Verifiability should ensure that incorrect outputs are always rejected, ev...
New Attacks against Transformation-Based Privacy-Preserving Linear Programming
cryptanalysis linear programming
2014/3/12
In this paper we demonstrate a number of attacks against proposed protocols for privacy-preserving linear programming, based on publishing and solving a transformed version of the problem instance. Ou...
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation
Practical Secure Efficient Multiparty Linear Programming Problem Transformation
2011/3/11
Cryptographic solutions to privacy-preserving multiparty linear pro-
gramming are slow. This makes them unsuitable for many economi-
cally important applications, such as supply chain optimization, ...
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation
cryptographic protocols / applications, cryptanalysis, distributed cryptography information hiding information theory secret sharing outsourcing linear optimization cloud computing
2012/3/29
Cryptographic solutions to privacy-preserving multiparty linear programming are slow. This makes them unsuitable for many economically important applications, such as supply chain optimization, whose ...