Linked e-resources
Details
Table of Contents
Intro; Preface; Organization; Contents; Attacks and Cryptanalysis; IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate; 1 Introduction; 2 Related Work; 3 Preliminaries; 3.1 Block Withholding Attack; 3.2 Notations for the Reward Rate; 4 The Reward Rate of Block Withholding Attack Under Static Mining Power; 5 Intermittent Withholding Attack; 5.1 Reward Rate; 5.2 The Intermittent Block WithHolding (IBWH) Attack; 5.3 Discussion; 6 The Reward Rate of BWH and IBWH Under Dynamic Mining Power; 7 Evaluation; 8 Further Discussions
8.1 The Reward Rate of Fork After Withholding8.2 The Reward Rate of Selfish Mining; 9 Conclusion; References; Full Database Reconstruction with Access and Search Pattern Leakage; 1 Introduction; 1.1 Organization of the Paper; 1.2 Contributions; 2 Model and Problem Statement; 3 Related Work; 3.1 Context; 3.2 Previous Results; 4 Full Ordering Reconstruction; 4.1 Approach; 4.2 Algorithm; 4.3 Query Complexity Analysis; 4.4 Lower Bound; 4.5 Dense Databases; 4.6 Databases with Special Properties; 5 Full Database Reconstruction; 5.1 Example; 5.2 Algorithm; 5.3 Analysis; 6 Conclusions; References
Cube Cryptanalysis of Round-Reduced ACORN1 Introduction; 1.1 Our Contributions; 2 Preliminaries; 2.1 Cube Attacks and Cube Testers; 2.2 Numeric Mapping; 2.3 Mixed Integer Linear Programming; 2.4 Bit-Based Division Property and MILP Representation; 2.5 Bit-Based Division Property and Cube Attack; 3 A Brief Description of ACORN; 4 A New Method to Search Good Cube Testers; 4.1 Greedy Algorithm for Finding Cube Testers; 4.2 Accelerating the Greedy Algorithm via Numeric Mapping; 4.3 Applications to ACORN; 5 Searching Cubes in Division Property Based Cube Attack
5.1 Finding Cube Testers via Division Property Based Cube Attack5.2 Finding Cubes for Key Recovery Attacks; 5.3 Applications to ACORN; 6 Conclusions; A KSG128(t) and FBK128(t); B Proof of Theorem1; C Cube Testers of Different Dimensions; D Embedded Property; References; Crypto I: Secure Computation and Storage; Auditable Compressed Storage; 1 Introduction; 2 Background; 2.1 Compression Algorithms; 2.2 Related Work; 3 Model and Security Guarantees; 3.1 System Model; 3.2 Adversarial Model; 3.3 Security Guarantees; 4 Auditable Compressed Storage; 4.1 ACS-RLE Scheme; 4.2 ACS-HUFF Scheme
4.3 Differences Between ACS-RLE and ACS-HUFF5 Analysis; 5.1 Security; 5.2 Performance; 6 Conclusion; References; Decentralized Evaluation of Quadratic Polynomials on Encrypted Data; 1 Introduction; 1.1 Technical Contribution; 1.2 Applications; 2 Preliminaries; 2.1 Notations; 2.2 Bilinear Group Setting; 2.3 Computational Assumption; 2.4 Security Notions; 3 Encryption for Quadratic Polynomial Evaluation; 3.1 Freeman's Framework; 3.2 Optimized Version; 3.3 Security Properties; 4 Decentralized Homomorphic Encryption; 4.1 Decentralized Key Generation; 4.2 Distributed Decryption
8.1 The Reward Rate of Fork After Withholding8.2 The Reward Rate of Selfish Mining; 9 Conclusion; References; Full Database Reconstruction with Access and Search Pattern Leakage; 1 Introduction; 1.1 Organization of the Paper; 1.2 Contributions; 2 Model and Problem Statement; 3 Related Work; 3.1 Context; 3.2 Previous Results; 4 Full Ordering Reconstruction; 4.1 Approach; 4.2 Algorithm; 4.3 Query Complexity Analysis; 4.4 Lower Bound; 4.5 Dense Databases; 4.6 Databases with Special Properties; 5 Full Database Reconstruction; 5.1 Example; 5.2 Algorithm; 5.3 Analysis; 6 Conclusions; References
Cube Cryptanalysis of Round-Reduced ACORN1 Introduction; 1.1 Our Contributions; 2 Preliminaries; 2.1 Cube Attacks and Cube Testers; 2.2 Numeric Mapping; 2.3 Mixed Integer Linear Programming; 2.4 Bit-Based Division Property and MILP Representation; 2.5 Bit-Based Division Property and Cube Attack; 3 A Brief Description of ACORN; 4 A New Method to Search Good Cube Testers; 4.1 Greedy Algorithm for Finding Cube Testers; 4.2 Accelerating the Greedy Algorithm via Numeric Mapping; 4.3 Applications to ACORN; 5 Searching Cubes in Division Property Based Cube Attack
5.1 Finding Cube Testers via Division Property Based Cube Attack5.2 Finding Cubes for Key Recovery Attacks; 5.3 Applications to ACORN; 6 Conclusions; A KSG128(t) and FBK128(t); B Proof of Theorem1; C Cube Testers of Different Dimensions; D Embedded Property; References; Crypto I: Secure Computation and Storage; Auditable Compressed Storage; 1 Introduction; 2 Background; 2.1 Compression Algorithms; 2.2 Related Work; 3 Model and Security Guarantees; 3.1 System Model; 3.2 Adversarial Model; 3.3 Security Guarantees; 4 Auditable Compressed Storage; 4.1 ACS-RLE Scheme; 4.2 ACS-HUFF Scheme
4.3 Differences Between ACS-RLE and ACS-HUFF5 Analysis; 5.1 Security; 5.2 Performance; 6 Conclusion; References; Decentralized Evaluation of Quadratic Polynomials on Encrypted Data; 1 Introduction; 1.1 Technical Contribution; 1.2 Applications; 2 Preliminaries; 2.1 Notations; 2.2 Bilinear Group Setting; 2.3 Computational Assumption; 2.4 Security Notions; 3 Encryption for Quadratic Polynomial Evaluation; 3.1 Freeman's Framework; 3.2 Optimized Version; 3.3 Security Properties; 4 Decentralized Homomorphic Encryption; 4.1 Decentralized Key Generation; 4.2 Distributed Decryption