搜索结果: 1-14 共查到“军事学 Fine-Grained”相关记录14条 . 查询时间(0.093 秒)
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting
puncturable encryption forward secrecy distributed setting
2019/8/14
Managing sensitive data in highly-distributed environments is gaining a lot of attention recently. Often, once data is presented to such environments, this data is persistent there. Being able to "for...
Public-Key Cryptography in the Fine-Grained Setting
Fine-grained Public-Key One-Way-Function
2019/6/4
Cryptography is largely based on unproven assumptions, which, while believable, might fail. Notably if P=NPP=NP, or if we live in Pessiland, then all current cryptographic assumptions will be broken. ...
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
Chameleon-Hash Implementation Blockchain
2019/4/23
Blockchain technologies recently received a considerable amount of attention. While the initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as Bitcoin, applicati...
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging
Secure channel forward/backward security security models
2018/6/5
We aim to understand the best possible security of a (bidirectional) cryptographic channel against an adversary that may arbitrarily and repeatedly learn the secret state of either communicating party...
Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data
FMRS secret-key cryptography
2018/5/15
With the advancement of Cloud computing, people now store their data on remote Cloud servers for larger computation and storage resources. However, users’ data may contain sensitive information of use...
Fine-Grained and Application-Ready Distance-Bounding Security
DB-security properties DB protocols
2018/5/2
Distance-bounding (DB) protocols are being adopted in different applications, e.g., contactless payments, keyless entries. For DB to be application-ready, "pick-and-choose" corruption models and clear...
This paper initiates a study of Fine Grained Secure Computation: i.e. the construction of secure computation primitives against ``moderately complex" adversaries. We present definitions and constructi...
Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
Searchable Encryption Access Control Data Privacy
2017/4/17
Fine-grained access control, especially in shared data environments such as the cloud, is a common scenario. Suppose a data owner encrypts and stores a collection of NN documents in the cloud, and wis...
We present functions that can be computed in some fixed polynomial time but are hard on average for any algorithm that runs in slightly smaller time, assuming widely-conjectured worst-case hardness fo...
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
Black-box separations circular security
2017/2/21
We address the problems of whether t-circular-secure encryption can be based on (t-1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based...
Fine-grained Cryptography
Fine-grained Cryptography Public Key Cryptography Randomized Encodings
2016/6/7
Fine-grained cryptographic primitives are ones that are secure against adversaries with a-priori bounded polynomial resources (time, space or parallel-time), where the honest algorithms use less resou...
Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation
applications public-key cryptography
2015/12/24
We consider a sensor network setting in which the sensed samples are encrypted individually using different keys before being streamed to a cloud storage. For large systems with high capacity, e.g. ge...
Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption
public-key cryptography
2012/3/27
Predicate Encryption(PE) is a new encryption paradigm which provides more sophisticated and flexible functionality. We present an efficient construction of Predicate Encryption which is IND-AH-CPA sec...
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
Attribute-Based Encryption Fine-Grained Access Control Encrypted Data
2008/12/17
As more sensitive data is shared and stored by third-party sites on the Internet, there
will be a need to encrypt data stored at these sites. One drawback of encrypting data,
is that it can be selec...