搜索结果: 1-15 共查到“知识库 Being Rational”相关记录269条 . 查询时间(0.141 秒)
Sucker punch makes you richer: The threat of rational miners
blockchain double-spending attack incentive
2019/6/26
Honest majority is a vital assumption of Bitcoin-style blockchains. However, recent 51% attacks render this assumption unrealistic in practice. In this paper, we analyse two possible 51% attacks launc...
Temporary Censorship Attacks in the Presence of Rational Miners
blockchain samrt contract bribery
2019/6/26
Smart contracts allow for exchange of coins according to program rules. While it is well known that so called bribery contracts can influence the incentive mechanism of a Nakamotostyle consensus, we p...
On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography
Montgomery curves Edwards curves Kummer lines
2018/11/16
A paper by Karati and Sarkar at Asiacrypt'17 has pointed out the potential for Kummer lines in genus one, by observing that its SIMD-friendly arithmetic is competitive with the status quo. A more rece...
Weak Compression and (In)security of Rational Proofs of Storage
information theory proofs of storage rational security
2018/5/28
We point out an implicit unproven assumption underlying the security of rational proofs of storage that is related to a concept we call weak randomized compression.
SOLVING THE RATIONAL POLYNOMIAL COEFFICIENTS BASED ON L CURVE
RPC model Tikhonov Regularization method L Curve orthorectification rigorous sensor model ill conditioned equation
2018/5/17
The rational polynomial coefficients (RPC) model is a generalized sensor model, which can achieve high approximation accuracy. And it is widely used in the field of photogrammetry and remote sensing. ...
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Blockchain Protocols Rational Protocol Design Bitcoin
2018/2/8
An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure ...
Parameterization of Edwards curves on the rational field Q with given torsion subgroups
Edwards curve twisted Edwards curve torsion subgroups
2018/1/29
This paper presents the basic concepts of the Edwards curves, twisted Edwards curves and the point addition laws on these curves. The main result is the parameterization of the Edward curve with the g...
Trust models are widely used in various computer science disciplines. The main purpose of a trust model is to continuously measure trustworthiness of a set of entities based on their behaviors. In thi...
Perfectly Secure Message Transmission Scheme against Rational Adversaries
secure message transmission game theory rational adversary
2017/4/12
Secure Message Transmission (SMT) is a two-party cryptographic scheme by which a sender securely and reliably sends messages to a receiver using nn channels. Suppose that an adversary corrupts at most...
Rational Proofs against Rational Verifiers
rational proof delegation of computation game theory
2017/3/27
Rational proofs, introduced by Azar and Micali (STOC 2012), are a variant of interactive proofs in which the prover is rational, and may deviate from the protocol for increasing his reward. Guo et al....
Study on functions and rational allocation of Shule River Basin groundwater resources
Shule River Basin The function zoning Assessment of groundwater resources Rational allocation of water resources
2018/3/23
Based on Investigation and Assessment on Rational Exploitation and Utilization of Groundwater Resources in Typical Areas of the Hexi Corridor, the thesis studies on groundwater and environmental probl...
Rational permeability coefficient of a permeable lining for composite tunnel lining structures
tunneling engineering deeply-buried tunnel composite lining structure concrete permeable lining grouting circle parameter permeability coefficient reasonable value
2018/5/11
Various factors influence the tunneling are simplified considering the axial symmetry of the composite lining structure. The analytical expressions for the seepage field,stress,and displacement in the...
Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions
Cryptocurrencies Bitcoin Blockchain
2016/12/9
We present a radical solution to the two foremost challenges facing ``blockchain''-based cryptocurrencies: (1) ``mining pool'' oligopolies and (2) incompressibility of delays affecting validation. Bot...
Accelerating Homomorphic Computations on Rational Numbers
Fully Homomorphic Encryption Encoding Confidential Machine Learning
2016/7/7
Fully Homomorphic Encryption (FHE) schemes are conceptually very powerful tools for outsourcing computations on confidential data. However, experience shows that FHE-based solutions are not sufficient...
There is a well-documented indication that several applications would benefit from the transparency afforded by argumentation to support decision-making where standard decision theory is not useful, e...