搜索结果: 1-11 共查到“军事学 Definition”相关记录11条 . 查询时间(0.094 秒)
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction
Password Reset Protocol Provable Security
2016/4/6
Many online services adopt a password-based user authentication system because of its
usability. However, several problems have been pointed out on it, and one of the well-known problems
is that a u...
Controlled Homomorphic Encryption: Definition and Construction
Functional Encryption Non-malleability Fully Homomorphic Encryption
2016/1/5
Fully Homomorphic Encryption schemes (FHEs) and Functional Encryption schemes
(FunctEs) have a tremendous impact in Cryptography both for the natural questions that
they address and for the wide ran...
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
key exchange constructive cryptography
2014/3/10
Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is us...
Strong designated verifier signature scheme: new definition and construction
Undeniable signature Designation of verifiers Discrete logarithm Random oracle model
2010/9/21
Recently, several strong designated verifier signature schemes have been proposed in the literature. In this paper, we first point out that such so-called strong designated verifier signature scheme i...
Grouping-Proof Protocol for RFID Tags:Security Definition and Scalable Construction
RFID Security Yoking-Proof Grouping-Proof Scalability
2009/12/29
In this paper, we propose a grouping-proof protocol
for RFID tags based on secret sharing. Our proposed
protocol addresses the scalability issue of the previous
protocols by removing the need for a...
A Game-Based Definition of Coercion-Resistance and its Applications
Game-Based Definition Coercion-Resistance Applications
2009/12/29
Coercion-resistance is one of the most important and intricate security requirements
for voting protocols. Several definitions of coercion-resistance have
been proposed in the literature, both in cr...
Subtleties in the Definition of IND-CCA:When and How Should Challenge-Decryption be Disallowed?
Definitions foundations encryption
2009/9/2
The definition of IND-CCA disallows an adversary from querying the challenge ciphertext to
its decryption oracle. We point out that there are several ways to formalize this. We show that,
surprising...
Secret Handshake:Strong Anonymity Definition and Construction
secret handshake anonymity traceability
2009/6/12
Secret handshake allows two members in the same group to
authenticate each other secretly. In previous works of secret handshake
schemes, two types of anonymities against the group authority (GA) of...
We investigate definitions of security for previously proposed
schemes for electronic cash and strengthen them so that the bank does
need to be trusted to the same extent. We give an experiment-base...
Key Exchange Protocols::Security Definition, Proof Method and Applications
Key Exchange Protocols Security Definition Proof Method Applications
2008/10/29
We develop a compositional method for proving cryptograph-
ically sound security properties of key exchange protocols, based on a
symbolic logic that is interpreted over conventional runs of a prot...
A New Security Definition for Public Key Encryption Schemes and Its Applications
Public Key Encryption Adaptive Chosen Ciphertext Attacks Standard Model
2008/5/30
The strongest security definition for public key encryption (PKE) schemes
is indistinguishability against adaptive chosen ciphertext attacks (IND-CCA).