搜索结果: 1-15 共查到“Encryption”相关记录1362条 . 查询时间(0.184 秒)
Stretchable and self-healable double-network ionogel with strong adhesion and temperature tolerance for information encryption
Ionic liquids Ionogel Double network Fluorescence Information encryption
2023/11/30
Recently, hydrogels with adjustable mechanical properties have been developed for information security applications. However, the defects such as easy drying and inferior resistance to extreme tempera...
Verifiable Registration-Based Encryption
Public Key Encryption Registration based Encryption Key Escrow Problem
2019/9/19
In a recent work, Garg, Hajiabadi, Mahmoody, and Rahimi (TCC 18) introduced a new encryption framework, which they referred to as Registration-Based Encryption (RBE). The central motivation behind RBE...
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Predicate Encryption Bilinear Maps Probabilistic Rank
2019/9/19
In predicate encryption for a function ff, an authority can create ciphertexts and secret keys which are associated with `attributes'. A user with decryption key KyKy corresponding to attribute yy can...
Modeling Memory Faults in Signature and Encryption Schemes
fault attacks security model fault resilience deterministic signatures
2019/9/19
Memory fault attacks, inducing errors in computations, have been an ever-evolving threat to cryptographic schemes since their discovery for cryptography by Boneh et al. (Eurocrypt 1997). Initially req...
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Dynamic Searchable Symmetric Encryption Forward Privacy Backward Privacy
2019/9/19
Dynamic Searchable Symmetric Encryption (DSSE) enables a client to perform updates and searches on encrypted data which makes it very useful in practice. To protect DSSE from the leakage of updates (l...
Sponges Resist Leakage: The Case of Authenticated Encryption
AEAD Leakage Resilience Side Channels
2019/9/17
In this work we advance the study of leakage-resilient Authenticated Encryption with Associated Data (AEAD) and lay the theoretical groundwork for building such schemes from sponges. Building on the w...
Simple and Efficient KDM-CCA Secure Public Key Encryption
key dependent message security chosen ciphertext security
2019/9/16
We propose two efficient public key encryption (PKE) schemes satisfying key dependent message security against chosen ciphertext attacks (KDM-CCA security). The first one is KDM-CCA secure with respec...
The Local Forking Lemma and its Application to Deterministic Encryption
Deterministic public-key encryption searchable encryption forking lemma
2019/9/16
We bypass impossibility results for the deterministic encryption of public-key-dependent messages, showing that, in this setting, the classical Encrypt-with-Hash scheme provides message-recovery secur...
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages
Authenticated encryption new primitive forkcipher
2019/9/6
Highly efficient encryption and authentication of short messages is an essential requirement for enabling security in constrained scenarios such as the CAN FD in automotive systems (max. message size ...
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications
Homomorphic encryption Automatic arithmetic circuit generation Lattice-based cryptography
2019/9/3
Homomorphic Encryption (HE) is an emerging technnology that enables computing on data while the data is encrypted. A major challenge with homomorphic encryption is that it takes extensive expert knowl...
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Fully Homomorphic Encryption Neural Networks LWE
2019/8/30
Securing Neural Network (NN) computations through the use of Fully Homomorphic Encryption (FHE) is the subject of a growing interest in both communities. Among different possible approaches to that to...
New Constructions of Hinting PRGs, OWFs with Encryption, and more
number theory one-way functions RSA
2019/8/27
Over the last few years there has been a surge of new cryptographic results, including laconic oblivious transfer, (anonymous/ hierarchical) identity-based encryption, trapdoor functions, chosen-ciphe...
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits
somewhat homomorphic encryption multiplicative depth Boolean functions
2019/8/27
In somewhat homomorphic encryption schemes (e.g. B/FV, BGV) the size of ciphertexts and the execution performance of homomorphic operations depends heavily on the multiplicative depth. The multiplicat...
Fast, Compact, and Expressive Attribute-Based Encryption
attribute-based encryption standard assumption non-monotone
2019/8/27
Attribute-based encryption (ABE) is an advanced cryptographic tool and useful to build various types of access control systems. Toward the goal of making ABE more practical, we propose key-policy (KP)...
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
public-key cryptography Rand-RCCA PKE
2019/8/22
Re-randomizable RCCA-secure public key encryption (Rand-RCCA PKE) schemes reconcile the property of re-randomizability of the ciphertexts with the need of security against chosen-ciphertexts attacks.