搜索结果: 31-45 共查到“军事学 Public key encryption”相关记录131条 . 查询时间(0.062 秒)
This paper proposes a public-key cryptosystem and a short password encryption mode, where traditional hardness assumptions are replaced by specific refinements of the CAPTCHA concept called Decisional...
Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
black-box separation public key encryption one-way function
2016/12/10
Separating public key encryption from one way functions is one of the fundamental goals of complexity-based cryptography. Beginning with the seminal work of Impagliazzo and Rudich (STOC, 1989), a sequ...
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
public-key encryption key-dependent messages chosen-ciphertext security
2016/12/10
KDM[F][F]-CCA secure public-key encryption (PKE) protects the security of message f(sk)f(sk), with f∈Ff∈F, that is computed directly from the secret key, even if the adversary has access to a decrypti...
Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR
Post-Quantum Cryptography Public-Key Encryption Learning with Rounding (LWR)
2016/12/7
The Learning with Errors (LWE) is one of the most promising primitive for post-quantum cryptography due to its strong security reduction from the worst-case of NP-hard problems and its lightweight ope...
Leakage-Resilient Public-Key Encryption from Obfuscation
leakage resilient cryptography program obfuscation
2016/7/28
The literature on leakage-resilient cryptography contains various leakage models that provide different
levels of security. In this work, we consider the bounded leakage and the continual leakage mod...
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption
Public Key Encryption randomized algorithms
2016/6/2
We describe a general technique to protect randomized algorithms against kleptographic attacks. We then apply the technique to construct the first IND-CPA secure public-key encryp- tion scheme in the ...
On the Selective Opening Security of Practical Public-Key Encryption Schemes
public key encryption selective opening security SIM-SO-CCA
2016/4/6
We show that two well-known and widely employed public-key encryption schemes – RSA Optimal
Asymmetric Encryption Padding (RSA-OAEP) and Diffie-Hellman Integrated Encryption Scheme
(DHIES), instanti...
New Framework for Secure Server-Designation Public Key Encryption with Keyword Search
Computer Networks Information Security Distributed Systems
2016/4/6
Recently, a new framework, called secure server-designation public key encryption
with keyword search (SPEKS), was introduced to improve the security of dPEKS
(which suffers from the on-line keyword...
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings
PKEET public-key cryptography
2016/3/14
In recent years, public key encryption with equality test (PKEET) has become
a hot research topic in the cryptography community due to the advancement of cloud
computing. Recently, Ma et al. propose...
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Public-key encryption selective-opening security lossy encryption
2016/2/24
In a selective-opening (SO) attack on an encryption scheme, an adversary A gets a number of ciphertexts (with possibly related plain- texts), and can then adaptively select a subset of those ciphertex...
Yao's millionaires' problem and public-key encryption without computational assumptions
Yao's millionaires' problem computationally unbounded adversary
2016/2/24
We offer efficient and practical solutions of Yao's millionaires' problem without using any one-way functions. Some of the solutions involve physical principles, while others are purely mathematical. ...
Fully Homomorphic Public-key Encryption Based on Discrete Logarithm Problem
fully homomorphic public-key encryption discrete logarithm problem octonion ring
2016/1/27
In this paper I propose the new fully homomorphic public-key
encryption scheme without bootstrapping that is based on the discrete
logarithm assumption and computational Diffie–Hellman assumption of...
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Department of Computer Engineering,University of Peradeniya
2016/1/26
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simpl...
An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
constant-round cryptographic protocols multi-party computation pseudo-random generator
2016/1/26
We present a pseudo-random bit generator expanding a uniformly random bitstring
r of length k/2, where k is the security parameter, into a pseudo-random bit-string
of length 2k − log2
(k) usi...
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
Identity-based encryption Bounded-CCA security
2016/1/26
Identity-based encryption (IBE) is a special case of public-key encryption where
user identities replace public keys. Every user is given a corresponding secret key for decryption,
and encryptions f...