Methods of Speeding Up Secret Computations With Insecure Auxiliary Computer

نویسنده

  • Yerzhan N. Seitkulov
چکیده

Currently, the problem of speeding up secret computations with the help of an auxiliary computer changed and was enriched by numerous problems of computational mathematics, where a solution means an approximate solution. The main goal of this paper is to demonstrate the different methods of computing approximate solutions of some equations with help of an auxiliary computer. To show methods, we chose the certain classes of algebraic and differential equations because in most cases modern computing problems are reduced to solving such systems of equations (differential equations, linear programming, etc.).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacks on Protocols for Server-Aided RSA Computation

On Crypto ’88, Matsumoto, Kato, and Imai presented protocols to speed up secret computations with insecure auxiliary devices. The two most important protocols enable a smart card to compute the secret RSA operation faster with the help of a server that is not necessarily trusted by the card holder. It was stated that if RSA is secure, the protocols could only be broken by exhaustive search in c...

متن کامل

Key-Insulated Public Key Cryptosystems

Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret k...

متن کامل

Speeding up the Stress Analysis of Hollow Circular FGM Cylinders by Parallel Finite Element Method

In this article, a parallel computer program is implemented, based on Finite Element Method, to speed up the analysis of hollow circular cylinders, made from Functionally Graded Materials (FGMs). FGMs are inhomogeneous materials, which their composition gradually varies over volume. In parallel processing, an algorithm is first divided to independent tasks, which may use individual or shared da...

متن کامل

نقش رایانه در طراحی فرش (در سه دهه اخیر)

Design, color and pattern, which are of the carpet overriding esthetic elements, create identity for a carpet. Designers have been depicting the most beautiful and attractive pictures as the carpet design for the past centuries. The history of incorporating computer-based designs into carpets does not exceed three decades; therefore, it is a present-day technology adopted: In the similar vein, ...

متن کامل

Speeding up the Grover algorithm using auxiliary solutions

It may be possible to extend the Grover search algorithm by taking a divide and conquer approach using auxiliary solutions to achieve a significant speed-up.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011