搜索结果: 1-8 共查到“军事学 Reconciliation”相关记录8条 . 查询时间(0.054 秒)
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol
RLWE Post Quantum Key Exchange
2017/12/11
Error reconciliation is an important technique for Learning With Error (LWE) and Ring-LWE (RLWE)-based constructions. In this paper, we present a comparison analysis on two error reconciliation-based ...
On Reliability, Reconciliation, and Error Correction in Ring-LWE Encryption
Ring-LWE Reconciliation Post-Quantum Encryption
2017/5/23
We describe a new reconciliation method for Ring-LWE that has a significantly smaller failure rate than previous proposals while reducing ciphertext size and the amount of randomness required. It is b...
At PQ Crypto 2014, Peikert proposed efficient and practical lattice-based protocols for key transport, encryption and authenticated key exchange. One of the main technical innovations of this work is...
In this paper we introduce NewHope-Simple, a variant of the NewHope Ring-LWE-based key exchange that is using a straight-forward transformation from Ring-LWE encryption to a passively secure KEM (or k...
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses
physical unclonable function error correction key reconciliation
2016/12/8
Physical Unclonable Functions (PUFs) are promising primitives for lightweight integrated circuit authentication. Indeed, by extracting an identifier from random process variations, they allow each ins...
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)
privacy-enhancing technologies secure multi-party computation
2014/3/7
The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols h...
New Advances on Privacy-Preserving Policy Reconciliation
Privacy-Preserving Policy Reconciliation individual preferences
2010/2/20
Entities define their own set of rules under which they are willing to collaborate, e.g., interact, share and exchange resources or information with others. Typically, these individual policies differ...
Scrambling Adversarial Errors Using Few Random Bits,Optimal Information Reconciliation,and Better Private Codes
Scrambling Adversarial Errors Random Bits Optimal Information Reconciliation
2008/10/22
When communicating over a noisy channel, it is typically much easier to deal with random,
independent errors with a known distribution than with adversarial errors.