搜索结果: 1-15 共查到“军事学 New Constructions”相关记录21条 . 查询时间(0.046 秒)
New Constructions of Hinting PRGs, OWFs with Encryption, and more
number theory one-way functions RSA
2019/8/27
Over the last few years there has been a surge of new cryptographic results, including laconic oblivious transfer, (anonymous/ hierarchical) identity-based encryption, trapdoor functions, chosen-ciphe...
New Constructions of Reusable Designated-Verifier NIZKs
cryptographic protocols Non-interactive zero-knowledge
2019/3/4
Non-interactive zero-knowledge arguments (NIZKs) for NP are an important cryptographic primitive, but we currently only have instantiations under a few specific assumptions. Notably, we are missing co...
Secure Deduplication of Encrypted Data: Refined Model and New Constructions
SDoE realistic datasets
2017/11/13
Cloud providers tend to save storage via cross-user deduplication, while users who care about privacy tend to encrypt their files on client-side. Secure deduplication of encrypted data (SDoE) is an ac...
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions
automated proofs symbolic security attribute-based encryption
2017/10/10
Attribute-based encryption (ABE) is a cryptographic primitive which supports fine-grained access control on encrypted data, making it an appealing building block for many applications. In this paper, ...
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
KDM security IBE LPN
2017/10/9
Finally, we show that the notion of one-time signatures with encryption is also useful for the construction of key-dependent-message (KDM) secure public-key encryption. In particular, our results impl...
An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both
digital signatures homomorphic signatures attribute-based signatures
2017/7/28
In Attribute-Based Signatures (ABS; first defined by Maji, Prabhakaran and Rosulek, CT-RSA 2011) an authority can generate multiple signing keys, where each key is associated with an attribute xx. Mes...
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Identity-based Signatures Sequential Aggregate Signatures the CDH Assumption
2017/4/12
Identity-based sequential aggregate signature (IBSAS) schemes are usually applied to secure network routing and sensor networks, since they allow multiple signers to sequentially produce a short signa...
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
order-revealing encryption order-preserving encryption range queries
2016/6/15
In the last few years, there has been much interest in developing methods to search over encrypted data. In the case of range queries, a simple solution is to encrypt the contents of the database usin...
Simulatable Leakage: Analysis, Pitfalls, and new Constructions
leakage resilience side channel attack simulatable leakage
2016/1/9
In 2013, Standaert et al. proposed the notion of simulatable
leakage to connect theoretical leakage resilience with the practice of
side channel attacks. Their use of simulators, based on physical d...
Disjunctions for Hash Proof Systems: New Constructions and Applications
Hash Proof System Non-Interactive Zero-Knowledge Proof Group Password Authenticated Key Exchange
2016/1/9
Hash Proof Systems were first introduced by Cramer and Shoup (Eurocrypt’02) as a
tool to construct efficient chosen-ciphertext-secure encryption schemes. Since then, they have found
many other appli...
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Pseudorandom functions multilinear PRFs aggregate PRFs
2015/12/23
Since its introduction, pseudorandom functions (PRFs) have become one of the main building
blocks of cryptographic protocols. In this work, we revisit two recent extensions of standard PRFs,
namely ...
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
QA-NIZK Arguments Asymmetric Groups
2015/12/23
SIMON and SPECK family ciphers have attracted the attention of cryptographers all over the world since proposed by NSA in June, 2013. At CHES 2015, Simeck, a new block cipher inspired from both SIMON ...
A General Framework for Redactable Signatures and New Constructions
redactable signatures designated redactors privacy
2015/12/21
A redactable signature scheme (RSS) allows removing parts of
a signed message by any party without invalidating the respective signature.
State-of-the-art constructions thereby focus on messages rep...
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
New Constructions Multilinear Maps
2014/3/5
RIBE.Revoke(ID;T;RL;ST): This algorithm takes as input an identityID, a revocation time T, the revo-cation listRL, and the state ST. If (ID; )= 2ST, then it outputs ?since the private key ofIDwas not
...
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters
one-way functions pseudorandom generators
2014/3/13
We revisit the problem of basing pseudorandom generators on regular one-way functions, and present the following constructions:
(1) For any known-regular one-way function (on $n$-bit inputs) that is ...