搜索结果: 1-14 共查到“军事学 Mechanisms”相关记录14条 . 查询时间(0.125 秒)
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
LWE RLWE KEM
2019/3/13
In this paper, we present a simple attack on LWE and Ring LWE encryption schemes used directly as Key Encapsulation Mechanisms (KEMs). This attack could work due to the fact that a key mismatch in a K...
Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies
Blockchain Cryptocurrencies Auction
2018/11/20
Permissionless blockchain systems, such as Bitcoin, rely on users using their computational power to solve a puzzle in order to achieve a consensus. To incentivise users in maintaining the system, new...
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
hybrid key exchange key exchange hybrids
2018/11/9
Concerns about the impact of quantum computers on currently deployed public key cryptography have instigated research into not only quantum-resistant cryptographic primitives but also how to transitio...
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus
implementation Trusted Computing
2018/1/2
Trusted computing technologies may play a key role for cloud security as they enable users to relax the trustworthiness assumptions about the provider that operates the physical cloud infrastructure. ...
Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms
Anonymity Differential Privacy
2017/9/18
Differential privacy, and close other notions such as dχdχ-privacy, is at the heart of the privacy framework when considering the use of randomization to ensure data privacy. Such a guarantee is alway...
Novel differentially private mechanisms for graphs
anonymity applications information theory
2016/12/12
In this paper, we introduce new methods for releasing differentially private graphs. Our techniques are based on a new way to distribute noise among edges weights. More precisely, we rely on the addit...
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms
Attribute-Based Encryption Homomorphic-Policy LSSS
2016/12/7
Attribute-Based Encryption (ABE) allows to target the recipients of a message according
to a policy expressed as a predicate among some attributes. Ciphertext-policy ABE schemes can
choose the polic...
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
public-key cryptography selective opening
2016/1/5
We study simulation-based, selective opening security against chosen-ciphertext attacks (SIM-SO-CCA security) for public key encryption (PKE). In a selective opening, chosen-ciphertext attack (SO-CCA)...
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
public key encryption puncturable key encapsulation mechanism chosen ciphertext security
2016/1/4
In this paper, we introduce and study a new cryptographic primitive that we call puncturable key encapsulation
mechanism (PKEM), which is a special class of KEMs that satisfy some functional and secu...
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
Financial cryptography Private comparison Yao’s Millionaire problem
2015/12/31
A (or a group of) selling agent wants to allocate and sell a (or a set of) parcel of land optimally and fairly to a buying agent within the capacity constraint of the selling agent and budget constrai...
Differential Privacy in distribution and instance-based noise mechanisms
Anonymity Information hiding
2015/12/25
In this paper, we introduce the notion of (, δ)-differential privacy in distribution,
a strong version of the existing (, δ)-differential privacy, used to mathematically ensure
that private data o...
Information-theoretic Bounds for Differentially Private Mechanisms
Differential Privacy Information theory
2012/3/29
There are two active and independent lines of research that aim at quantifying the amount of information that is disclosed by computing on confidential data. Each line of research has developed its ow...
Information-theoretic Bounds for Differentially Private Mechanisms
Differential Privacy Information theory
2011/2/23
There are two active and independent lines of research that aim at quantifying the amount of information that is disclosed by computing on confidential data. Each line of research has developed its ow...
Digital Enhanced Cordless Telecommunications (DECT) is
a standard for connecting cordless telephones to a xed telecommunications
network over a short range. The cryptographic algorithms used in
DE...