44 Matching Annotations
  1. May 2024
  2. Apr 2024
    1. credentials from various issuers. Another vital property is issuer hiding, ensuring that the issuer's identity remains concealed, revealing only compliance with the verifier's policy. This prevents unique identification based on the sole combination of credential issuers. To date, there exists no AC scheme satisfying both

      jfjfm

  3. Feb 2024
  4. Dec 2023
  5. Nov 2023
    1. Even state transfer cannot help the affected client for a

      summary: 1. checkpoint may not happen 2. happened by still can not answer (not clear to me) 3. happening unfrequently makes latency

    2. operation (say, an update) is consideredcommitted and ready for execution when it is confirmed

      I think there is an extra round. committed -> gather a quorum -> excute _> when gathered enough, respond client for yes, otherwise no.

  6. Oct 2023
    1. the dealer can either use anon-interactive zero-knowledge (NIZK) proof constructed using the Fiat-Shamirheuristic as in [Sch99] (resulting in a construction in the ROM under the DDHassumption) or have the parties do pairing based checks as in [HV09] (resultingin a construction in the plain model under the DBS assumption)

      ROM + DDH vs DBS

  7. Sep 2023
  8. Jul 2023
  9. May 2023
    1. These have beenstudied to a lesser extent, and we address this gap in thispape

      第一类攻击影响可用性 第二类在模型植入后门 本文关注于第二类

    1. pically outsource sensitive data to cloudML services.

      通常将敏感数据外包给云端的机器学习服务。

      PPML 结合ML和MPC保护隐私

    1. While all axiomatizable theories of non-linear arithmetic are incomplete,LIRR is weak by design (relative to say Peano arithmetic), trading power for tractable automatedreasoning:

      本文提出的LIRR (ring),相比,nonlinear arithmetic

    1. we analyze the “computable approximability” of different problems and providescomputable imprecision witnesses for decidable approximations of certain undecidable problems.

      本工作

    2. there exist computable functions that take as input the implementation (source code) of adecidable approximation and output a witness on which the approximation is imprecise.

      存在一个可计算函数,用于计算一个可判定近似器的不精确性(witness)

  10. Apr 2023
    1. UDQ-unique

      收到2/3消息是b,则半数以上好节点是b

      比如10个节点的边界情况: 好:4b, 3b' 坏 <= 3b' 因此b'不可能过2/3。只有b可以

      注意好节点的消息一定会收到(7条)

      4.10 update: R是一个round收到的所以消息,同步网络下,至少由2/3条消息(诚实节点一定会发出)。那么,如果这R些消息中,2/3是b,R中的1/3一定存在b,不想说了看图: 【n】 [ 2/3R | 1/3R] honest 【[ b | b' ] 】

      【[ b | b' ]】剩下的1/3b'即使全是honest,没有一半的总honest。