51 Matching Annotations
  1. May 2024
    1. Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search
    2. Probabilistically Checkable Arguments for all NP
    3. AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing
    4. Trapdoor Memory-Hard Functions
  2. Apr 2024
    1. credentials from various issuers. Another vital property is issuer hiding, ensuring that the issuer's identity remains concealed, revealing only compliance with the verifier's policy. This prevents unique identification based on the sole combination of credential issuers. To date, there exists no AC scheme satisfying both

      jfjfm

    2. Formal Analysis of Access Control Mechanism of 5G Core Network
  3. Feb 2024
    1. rrespective of any auxiliary input

    2. auxiliary input is implicit in the definitionsince computational indistinguishability with respect to non-uniform adversaries is required.

    3. randomized functionality f (x, y)

      Randomized

    4. Computationally indistinguishable

    5. plaintext length

      X^n

    6. auxiliary information

      h

    7. Formally,every party considered has a security parameter tape upon which the value 1 n is written.

      不懂

    1. The implementation of ByzzFuzz requires

      拦截信息,运行算法,然后决定对该信息修改并deliver(丢弃)

    2. small-scope message mutations

      idk what's this

    1. synchronous reactive programming language and frameworkfor designing, testing, and verifying distributed algorithms

      synchronous

    1. store

      store(v2, h, v1)σ that certifies that a block with hash value h initially proposed in view v1 was “stored” in view v2

  4. Dec 2023
    1. If a correct replica executes an operation op in aview v, no correct replica will change to a new view withoutexecuting o

      ?

  5. Nov 2023
    1. not ensure that all correct replicas execute all operationsin the same orde

      Not clear to me

    2. show operationseventually complete

      "Eventually"

    3. Even state transfer cannot help the affected client for a

      summary: 1. checkpoint may not happen 2. happened by still can not answer (not clear to me) 3. happening unfrequently makes latency

    4. the clientcannot accept a reply with less than 2f +1 matching responses

      This is my previous understanding.

    5. operation (say, an update) is consideredcommitted and ready for execution when it is confirmed

      I think there is an extra round. committed -> gather a quorum -> excute _> when gathered enough, respond client for yes, otherwise no.

  6. Oct 2023
    1. the dealer can either use anon-interactive zero-knowledge (NIZK) proof constructed using the Fiat-Shamirheuristic as in [Sch99] (resulting in a construction in the ROM under the DDHassumption) or have the parties do pairing based checks as in [HV09] (resultingin a construction in the plain model under the DBS assumption)

      ROM + DDH vs DBS

  7. Sep 2023
    1. orth a notion called reliable broad-casted seeding (Seeding) and construct it from aggregatable PVSS

      It's the same as ittai's

  8. Jul 2023
    1. main proof technique is to construct an invariant.

      Same as the idea in Ivy

  9. May 2023
    1. beingefficiently realizable in the secure setting

      还是使用norm bounds(即输入验证Input Validation),但是需要高效实现

    2. nforce constraints such asL2 and L∞ bounds on high-dimensional encrypted modelupdates

      什么意思

    3. general-purpose secure computation techniques (e.g.,generic MPC

      已有的工作要使用通用MPC,开销大

    4. These have beenstudied to a lesser extent, and we address this gap in thispape

      第一类攻击影响可用性 第二类在模型植入后门 本文关注于第二类

    5. one can reconstructsensitive data from clients’ local datase

      FL也可能根据观察梯度,重构数据

    1. tant, i.e., 2, whereas the Maxpool protocols in Falcon [12],SecureNN [11], and CryptFlow [17] require 104, 72, and

      差别这么大?! QWQ

    2. . Existing works inthe literature mostly fall into two categorie

      maxpool的协议,通信也是瓶颈

    3. . Intuitively, communication is the bottleneckfor all four comparison methods

      四种mpc-cmp协议通信都有bottleneck

    4. . Currently, MPC-based compar-ison (CMP) protocols could be categorized into four typ

      基于mpc的比较协议

    5. pically outsource sensitive data to cloudML services.

      通常将敏感数据外包给云端的机器学习服务。

      PPML 结合ML和MPC保护隐私

    6. This would be exacerbated in com-mercial deployment settin

      sota,CryptGPU,表现不好

    1. 휎표푟 -sentences that holdover the integers is undecidable

      相比real的是decidable

    2. While all axiomatizable theories of non-linear arithmetic are incomplete,LIRR is weak by design (relative to say Peano arithmetic), trading power for tractable automatedreasoning:

      本文提出的LIRR (ring),相比,nonlinear arithmetic

    3. reports “we foundZ3’s theory of nonlinear arithmetic to be slow and unstable;

      Z3 求解非线性运算很慢且不稳定

    1. This paper proves the following main results

      如下是witnessable

    2. transforming the proofs of undecidability to witnessfunctions.

      什么是intensional 和extensional

    3. we analyze the “computable approximability” of different problems and providescomputable imprecision witnesses for decidable approximations of certain undecidable problems.

      本工作

    4. there exist computable functions that take as input the implementation (source code) of adecidable approximation and output a witness on which the approximation is imprecise.

      存在一个可计算函数,用于计算一个可判定近似器的不精确性(witness)

  10. Apr 2023
    1. UDQ-unique

      收到2/3消息是b,则半数以上好节点是b

      比如10个节点的边界情况: 好:4b, 3b' 坏 <= 3b' 因此b'不可能过2/3。只有b可以

      注意好节点的消息一定会收到(7条)

      4.10 update: R是一个round收到的所以消息,同步网络下,至少由2/3条消息(诚实节点一定会发出)。那么,如果这R些消息中,2/3是b,R中的1/3一定存在b,不想说了看图: 【n】 [ 2/3R | 1/3R] honest 【[ b | b' ] 】

      【[ b | b' ]】剩下的1/3b'即使全是honest,没有一半的总honest。