Results 11 to 20 of about 62,745 (179)
A Rational Approach to Cryptographic Protocols [PDF]
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties.
Asokan+9 more
core +3 more sources
Compiling and securing cryptographic protocols [PDF]
A short version was submitted to ...
Chevalier, Yannick, Rusinowitch, Michael
openaire +3 more sources
Sequential rationality in cryptographic protocols [PDF]
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers.We propose a new framework ...
Ronen Gradwohl, Alon Rosen, Noam Livne
openaire +4 more sources
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao+6 more
wiley +1 more source
A Calculus for Cryptographic Protocols: The Spi Calculus [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Andrew D. Gordon, Martín Abadi
openaire +3 more sources
Superposition Attacks on Cryptographic Protocols [PDF]
Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information.
Ivan Damgård+4 more
openaire +5 more sources
Nonmonotonic cryptographic protocols [PDF]
The paper presents a new method for specifying and analyzing cryptographic protocols. The method offers several advantages over previous approaches. The technique is the first to allow reasoning about nonmonotonic protocols, which are needed for systems that rely on the deletion of information.
Peter Honeyman, Aviel D. Rubin
openaire +2 more sources
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan+7 more
wiley +1 more source
Fair Exchange in Strand Spaces [PDF]
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures
Joshua D. Guttman+2 more
core +2 more sources
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source