搜索结果: 76-90 共查到“军事学 Public key encryption”相关记录131条 . 查询时间(0.14 秒)
Public Key Encryption for the Forgetful
public-key cryptography / public key encryption backward recovery
2012/3/28
We investigate public key encryption that allows the originator of a ciphertext to retrieve a ``forgotten'' plaintext from the ciphertext. This type of public key encryption with ``backward recovery''...
Co-induction and Computational Semantics for Public-key Encryption with Key Cycles
Computational soundness and completeness greatest fixed-points least fixed points weak public-key indistinguishability strong public-key indistinguishability
2011/2/24
We consider the computational soundness and completeness of formal indistinguishability in public-key cryptography, in the presence of key-cycles. This problem in the absence of key-cycles is addresse...
Receiver-deniable public-key encryption is impossible
Receiver-deniable public-key encryption a public-key cryptosystem
2011/2/23
A receiver-deniable public-key cryptosystem is a public-key cryptosystem where the receiver can change her secret key as to make it look like a given ciphertext decrypts to some message different from...
After-the-Fact Leakage in Public-Key Encryption
Leakage-resilient cryptography Public-key encryption
2011/1/12
What does it mean for an encryption scheme to be leakage-resilient Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but only considered leakage t...
After-the-Fact Leakage in Public-Key Encryption
foundations / Leakage-resilient cryptography Public-key encryption
2012/3/30
What does it mean for an encryption scheme to be leakage-resilient Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but only considered leakage t...
Public-Key Encryption with Fuzzy Keyword Search withstanding Keyword Guessing Attacks
Public-key encryption with keyword search keyword guessing attack public-key encryption with fuzzy keyword search anonymous identity-based encryption
2010/12/14
With tremendous interests having been attracted, public-key encryption with keyword search (PEKS) achieves the searchability of encrypted keywords without sharing a secret between the sender and the r...
Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption
certificate-based encryption security model generic construction certificateless public key encryption standard model
2010/12/9
Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which was introduced to solve the certificate management problem in traditional public key encryption (PKI). It combines PKE ...
Deterministic Public-Key Encryption Revisited
Deterministic encryption trapdoor functions hardcore funtions lossy trapdoor functions
2010/10/20
This paper revisits the notion of determinsitic public-key encryption (DE) introduced by Bellare, Boldyreva, and O'Neill~(CRYPTO 2007) and further studied by Bellare et al.~(CRYPTO 2008), Boldyreva et...
PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
Predicate Privacy PEKS Randomization
2010/9/9
Recently, Shen, Shi, and Waters introduced the notion of predicate privacy, i.e., the property that t(x) reveals no information about the encoded predicate p, and proposed a scheme that achieves predi...
The PASSERINE Public Key Encryption and Authentication Mechanism
Rabin Cryptosystem Randomized Multiplication RFID Wireless Sensor Networks
2010/8/17
PASSERINE is a lightweight public key encryption mechanism which is based on a hybrid, randomized variant of the Rabin public key encryption scheme. Its design is targeted for extremely low-resource a...
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
Efficient Public-Key Encryption Computational Diffie-Hellman Standard Model
2010/2/1
This paper proposes practical chosen-ciphertext secure public-key encryption systems that
are provably secure under the computational Die-Hellman assumption, in the standard model.
Our schemes are ...
Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature
public-key digital signature linear code
2010/1/18
Drawback of code-based public-key cryptosystems is that their publickey
size is lage. It takes some hundreds KB to some MB for typical parameters.
While several attempts have been conducted to reduc...
Public-Key Encryption in the Bounded-Retrieval Model
Public-Key Encryption Bounded-Retrieval Model
2009/11/18
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security
against various forms of adversarial “key leakage” attacks. In this model, the adversary i...
Resettable Public-Key Encryption:How to Encrypt on a Virtual Machine
Resettable Public-Key Encryption Encrypt Virtual Machine
2009/9/27
Typical security models used for proving security of deployed cryptographic primitives do
not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is common to see
crypt...
Efficient Public Key Encryption Based on Ideal Lattices
Efficient Public Key Encryption Ideal Lattices
2009/6/23
Efficient Public Key Encryption Based on Ideal Lattices.