• No results found

[PDF] Top 20 Cluster Computing in Zero Knowledge

Has 10000 "Cluster Computing in Zero Knowledge" found on our website. Below are the top 20 most common "Cluster Computing in Zero Knowledge".

Cluster  Computing  in  Zero  Knowledge

Cluster Computing in Zero Knowledge

... of cluster computing in zero ...in zero knowledge. Under knowledge-of-exponent assumptions [Dam92, HT98, BP04], we construct a zero-knowledge proof system in which: ... See full document

42

Efficient  Threshold  Zero-Knowledge  with  Applications  to  User-Centric  Protocols

Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols

... of knowledge of one of the private keys of the two ...by computing the challenge as the output of a hash function, as in the Fiat-Shamir heuristic ... See full document

27

Concurrent  Zero  Knowledge  in  the  Bounded  Player  Model

Concurrent Zero Knowledge in the Bounded Player Model

... Security under concurrent general composition. Informally speaking, concurrent general composition con- siders the case that a protocol ρ for securely computing some functionality f , is run concurrently (many ... See full document

26

Efficient  Post-Quantum  Zero-Knowledge   and  Signatures

Efficient Post-Quantum Zero-Knowledge and Signatures

... with a generic transform similar to the well-known Fiat-Shamir (FS) transform [9]. As the basis of our scheme, we use the recently proposed ZKB proof system [10], which allows for proving statements of the form, “I know ... See full document

36

DIZK:  A  Distributed  Zero  Knowledge  Proof  System

DIZK: A Distributed Zero Knowledge Proof System

... Challenges and techniques. Distributing a zkSNARK is challenging. Protocols for zkSNARKs on large circuits involve solving multiple large instances of tasks about polynomial arithmetic over cryptographically- large prime ... See full document

30

Secret  Sharing   and  Statistical  Zero  Knowledge

Secret Sharing and Statistical Zero Knowledge

... Restricting the reconstruction algorithm to be a linear function of the shares gives us a special kind of secret-sharing scheme called a linear secret-sharing scheme. The Karchmer-Wigderson secret sharing scheme [21] for ... See full document

26

An Unconditional Study of Computational Zero Knowledge

An Unconditional Study of Computational Zero Knowledge

... above zero-knowledge property is referred to as strong since the simulator cannot produce a view-output pair by first generating the view and then computing the corresponding ...the ... See full document

64

A Comparison between Cluster, Grid, and Cloud Computing

A Comparison between Cluster, Grid, and Cloud Computing

... Grid computing is the segregation (separation) of resources from multiple sites to solve a problem that can’t be solved by using the processing of a single computer ...grid computing takes us back to the ... See full document

6

The optimize load balancing in cluster computing

The optimize load balancing in cluster computing

... we have already introduce that our algorithm work in cluster computing environment . It adopt the modal of message passing interface master slave architecture . It is applicable to multiple job multi ... See full document

6

Cloud Computing Cluster Introduction to Cloud Computing. Rick Martin, Co-chair, Cloud Computing Cluster August 26, 2013

Cloud Computing Cluster Introduction to Cloud Computing. Rick Martin, Co-chair, Cloud Computing Cluster August 26, 2013

... specified computing platform, both hardware and software? Is there another reason—like the knowledge base of the users which suggests the inclusion of a particular technology? ... See full document

15

Zero-Knowledge  Proof  of  Decryption  for  FHE  Ciphertexts

Zero-Knowledge Proof of Decryption for FHE Ciphertexts

... The complication is the condition “is small”, and typically much smaller than the modulus in the space. One can try to produce a tight proof (with respect to soundness), but that will leak information about the secret ... See full document

16

Title: A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud

Title: A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud

... A computer cluster consists of a set of loosely or tightly connected computers that work together so as to work as single system. Computer clusters have each node set to perform the same task, controlled and ... See full document

6

Implementation of Zero Knowledge Protocol in Wireless Security

Implementation of Zero Knowledge Protocol in Wireless Security

... of zero knowledge proofs in which prover wants to prove its identity to a verifier through some secret information (such as a password) but never wants that the second party to get anything about this ...by ... See full document

5

On  the  Existence  of  Three  Round  Zero-Knowledge  Proofs

On the Existence of Three Round Zero-Knowledge Proofs

... Abstract. We study the round complexity of zero-knowledge (ZK) proof systems. While five round ZK proofs for NP are known from standard assumptions [Goldreich-Kahan, J. Cryptology’96], Katz [TCC’08] proved ... See full document

31

The Datacenter as a Computer. An Introduction to the Design of Warehouse-Scale Machines

The Datacenter as a Computer. An Introduction to the Design of Warehouse-Scale Machines

... of computing cycles in the datacenter, potentially affecting the optimal design point of WSCs in unexpected ...simplifies cluster-level scheduling and load balancing and reduces the ... See full document

120

Green Computing: To Saving Energy by Computer Virtualization

Green Computing: To Saving Energy by Computer Virtualization

... Computer virtualization is that the method of running two or a lot of logical pc systems on one set of physical hardware. With virtualization, a supervisor might mix many physical systems into virtual machines on one ... See full document

5

Weak  Zero-Knowledge  Beyond  the  Black-Box  Barrier

Weak Zero-Knowledge Beyond the Black-Box Barrier

... One-message zero-knowledge with super-polynomial simulation can be constructed against uniform provers, assuming uniform collision-resistant keyless hash functions [BP04a], or against non-uniform verifiers, ... See full document

46

Languages  with  Efficient  Zero-Knowledge  PCP's  are  in  SZK

Languages with Efficient Zero-Knowledge PCP's are in SZK

... no efficient ZK-PCP for NP with a non-adaptive verifier, who prepares all of its PCP queries before seeing any answers, unless NP ⊆ coAM and polynomial-time hierarchy collapses. The question of whether adaptive ... See full document

19

Efficient  Delegation  of  Zero-Knowledge  Proofs  of  Knowledge  in  a  Pairing-Friendly  Setting

Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting

... Shamir, zero-knowledge proofs have played a significant role in modern cryptography: they allow a party to convince another party of the validity of a statement (proof of membership) or of its ... See full document

13

Efficient  Designated-Verifier  Non-Interactive  Zero-Knowledge  Proofs  of  Knowledge

Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge

... our knowledge, constructing designated-verifier zero-knowledge proof systems whose soundness is maintained after polynomially many interactions with the prover remains an open ... See full document

34

Show all 10000 documents...