Methods of Speeding Up Secret Computations With Insecure Auxiliary Computer
نویسنده
چکیده
Currently, the problem of speeding up secret computations with the help of an auxiliary computer changed and was enriched by numerous problems of computational mathematics, where a solution means an approximate solution. The main goal of this paper is to demonstrate the different methods of computing approximate solutions of some equations with help of an auxiliary computer. To show methods, we chose the certain classes of algebraic and differential equations because in most cases modern computing problems are reduced to solving such systems of equations (differential equations, linear programming, etc.).
منابع مشابه
Attacks on Protocols for Server-Aided RSA Computation
On Crypto ’88, Matsumoto, Kato, and Imai presented protocols to speed up secret computations with insecure auxiliary devices. The two most important protocols enable a smart card to compute the secret RSA operation faster with the help of a server that is not necessarily trusted by the card holder. It was stated that if RSA is secure, the protocols could only be broken by exhaustive search in c...
متن کاملKey-Insulated Public Key Cryptosystems
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret k...
متن کاملSpeeding up the Stress Analysis of Hollow Circular FGM Cylinders by Parallel Finite Element Method
In this article, a parallel computer program is implemented, based on Finite Element Method, to speed up the analysis of hollow circular cylinders, made from Functionally Graded Materials (FGMs). FGMs are inhomogeneous materials, which their composition gradually varies over volume. In parallel processing, an algorithm is first divided to independent tasks, which may use individual or shared da...
متن کاملنقش رایانه در طراحی فرش (در سه دهه اخیر)
Design, color and pattern, which are of the carpet overriding esthetic elements, create identity for a carpet. Designers have been depicting the most beautiful and attractive pictures as the carpet design for the past centuries. The history of incorporating computer-based designs into carpets does not exceed three decades; therefore, it is a present-day technology adopted: In the similar vein, ...
متن کاملSpeeding up the Grover algorithm using auxiliary solutions
It may be possible to extend the Grover search algorithm by taking a divide and conquer approach using auxiliary solutions to achieve a significant speed-up.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011