搜索结果: 1-15 共查到“军队指挥学 adaptive security”相关记录22条 . 查询时间(0.062 秒)
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions
Commitment Universal Composability Global Random Oracle
2019/5/21
We propose a generic framework for perfectly hiding UC-Commitment schemes in the Global Random Oracle model of Canetti \textit{el at.} (CCS 14). The main building block of our construction is a novel ...
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
public-key cryptography Full Attribute-hiding
2018/11/16
In this work, we propose two IPE schemes achieving both adaptive security and full attribute-hiding in the prime-order bilinear group, which improve upon the unique existing result satisfying both fea...
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures
hedged security nonce-based public-key encryption deterministic public-key encryption
2018/1/11
Nowadays it is well known that randomness may fail due to bugs or deliberate randomness subversion. As a result, the security of traditional public-key encryption (PKE) cannot be guaranteed any more. ...
Efficient, Round-optimal, Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security
Oblivious Transfer Commitment Schemes Universal Composability
2017/12/1
Adaptive security embodies one of the strongest notions of security that allows an adversary to corrupt parties at any point during protocol execution and gain access to its internal state. Since it m...
Revocable Hierarchical Identity-Based Encryption with Adaptive Security
Hierarchical identity-based encryption Key revocation Adaptive security
2016/12/12
Hierarchical identity-based encryption (HIBE) can be extended to revocable HIBE (RHIBE) if a private key of a user can be revoked when the private key is revealed or expired. Previously, many selectiv...
Adaptive Security of Yao's Garbled Circuits
Garbled Circuits Adaptive Security Secure Computation
2016/12/10
A recent work of Hemenway et al. (CRYPTO '16) modifies Yao's construction and shows that the resulting scheme is adaptively secure. This is done by encrypting the garbled circuit from Yao's constructi...
An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model
Broadcast Encryption Ciphertext-Policy Attribute-Based Encryption (CP-ABE) Access Structure
2016/12/7
In broadcast encryption schemes, a distribution center broadcasts an encrypted message to a subset SS chosen from a universe of receivers and only the intended users are able to decrypt the message. M...
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
public-key cryptography functional encryption
2016/3/23
Semi-adaptive security is a notion of security that lies between selective and adaptive security for Attribute-Based Encryption (ABE) and Functional Encryption (FE) systems. In the semi-adaptive model...
Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security
public-key cryptography attribute-based encryption
2016/2/23
We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that supports
attributes of unbounded polynomial length. Namely, the size of the public parameters is a
fixed polynomial ...
Constrained pseudorandom functions have recently been introduced independently by Boneh and
Waters (Asiacrypt’13), Kiayias et al. (CCS’13), and Boyle et al. (PKC’14). In a standard pseudorandom
func...
On the Connection between Leakage Tolerance and Adaptive Security
leakage resilience adaptive security
2016/1/8
More generally, we show that any n party protocol tolerates leakage of ≈\poly(log\spar) bits from one party at the end of the protocol execution, \emph{if and only if} the protocol has passive adaptiv...
From Selective to Adaptive Security in Functional Encryption
Functional encryption adaptive security generic constructions
2016/1/6
In a functional encryption (FE) scheme, the owner of the secret key can generate restricted decryption
keys that allow users to learn specific functions of the encrypted messages and nothing else. In...
DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption
deterministic finite automata FE over regular languages
2014/3/7
We present an adaptively secure functional encryption (FE) scheme based on deterministic finite automata (DFA). The construction uses composite-order bilinear pairings and is built upon the selectivel...
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
Adaptive Security Anonymous Identity-Based Encryption
2014/3/12
For searching keywords against encrypted data, the public key encryption scheme with keyword search (PEKS), and its an extension called secure-channel free PEKS (SCF-PEKS) have been proposed. In SCF-P...
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
Efficient Constructions IND-CCA
2012/3/26
In this paper we consider \emph{anonymity} in the context of Broadcast Encryption (BE). This issue has received very little attention so far and \emph{all but one} of the currently available BE scheme...