搜索结果: 1-15 共查到“军事学 secrecy”相关记录29条 . 查询时间(0.062 秒)
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting
puncturable encryption forward secrecy distributed setting
2019/8/14
Managing sensitive data in highly-distributed environments is gaining a lot of attention recently. Often, once data is presented to such environments, this data is persistent there. Being able to "for...
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Security protocols Authenticated key exchange Symmetric-key cryptography
2019/8/13
With the rise of the Internet of Things and the growing popularity of constrained end-devices, several security protocols are widely deployed or strongly promoted (e.g., Sigfox, LoRaWAN, NB-IoT). Base...
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Information theoretic security key agreement physical unclonable functions
2019/7/8
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random l...
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Authenticated key agreement Symmetric-key cryptography Perfect forward secrecy
2019/5/9
Key exchange protocols in the asymmetric-key setting are known to provide stronger security properties than protocols in symmetric-key cryptography. In particular, they can provide perfect forward sec...
pRate: Anonymous Star Rating with Rating Secrecy
reputation management star rating anonymity
2019/4/16
We introduce pRate, a novel reputation management scheme with strong security and privacy guarantees for the users and their reputation scores. The reputation scores are computed based on the (aggrega...
Forward Secrecy of SPAKE2
Provable Security Password Authenticated Key Exchange Forward Secrecy
2019/4/3
Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for standardization and integration in TLS 1.3. A...
A Public Key Exchange Cryptosystem Based on Ideal Secrecy
one way function ideal secrecy asymmetric key cryptography
2018/11/29
This paper proposes two closely related asymmetric key (or a public key) schemes for key exchange whose security is based on the notion of ideal secrecy. In the first scheme, the private key consists ...
The ICAO-standardized Password Authenticated Connection Establishment (PACE) protocol is used all over the world to secure access to electronic passports. Key-secrecy of PACE is proven by first modeli...
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications
forward secrecy proxy re-encryption improved security model
2018/4/10
We revisit the notion of proxy re-encryption (PRE), an enhanced public-key encryption primitive envisioned by Blaze et al. (Eurocrypt'98) and formalized by Ateniese et al. (NDSS'05) for delegating dec...
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper)
conditionally secure secret sharing secrecy computation
2017/7/28
Typically, when secrecy multiplication is performed in multiparty computation using Shamir’s (k,n) threshold secret sharing scheme, the result is a polynomial with degree of 2k-2 instead of k-1. This ...
0-RTT Key Exchange with Full Forward Secrecy
0-RTT key exchange Hierarchical IBE Puncturable Encryption
2017/3/6
Reducing latency overhead while maintaining critical security guarantees like forward secrecy has become a major design goal for key exchange (KE) protocols, both in academia and industry. Of particul...
Simultaneous Secrecy and Reliability Amplification for a General Channel Model
channel secrecy reliability
2016/12/10
We present a general notion of channel for cryptographic purposes, which can model either a (classical) physical channel or the consequences of a cryptographic protocol, or any hybrid. We consider {\e...
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Block ciphers Stream ciphers Encryption time
2016/1/25
In open literature there is a lack of focus on Shannon‟s secrecy of ciphers as
a security measurement of symmetric key encryption, hence in this research,
Shannon‟s theories on secrecy o...
We propose a definition of ballot secrecy in the computational
model of cryptography. The definition builds upon and strengthens
earlier definitions by Bernhard et al. (ASIACRYPT’12, ESORICS’11
& E...
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
Elliptic curve cryptosystem Signcryption Multicast
2015/12/29
Secure multicast communication has application in growing number of
applications. Forward secrecy is of prime importance and insures message
con謉entiality even long-term private key compromised. We ...