搜索结果: 1-15 共查到“军事学 chosen ciphertext”相关记录57条 . 查询时间(0.046 秒)
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Post-quantum cryptosystems Isogeny-based cryptosystems CSIDH
2019/9/17
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
Using SMT Solvers to Automate Chosen Ciphertext Attacks
Boolean Satisfiability Satisfiability Modulo Theories Application
2019/8/26
In this work we investigate the problem of automating the development of adaptive chosen ciphertext attacks on systems that contain vulnerable format oracles. Unlike previous attempts, which simply au...
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers
Feistel cipher Quantum chosen-ciphertext attacks Simon's algorithm
2018/12/19
Seminal results by Luby and Rackoff show that the 3-round Feistel cipher is secure against chosen-plaintext attacks (CPAs), and the 4-round version is secure against chosen-ciphertext attacks (CCAs). ...
On Quantum Chosen-Ciphertext Attacks and Learning with Errors
chosen-ciphertext security learning with errors quantum attacks
2018/12/11
Large-scale quantum computing is a significant threat to classical public-key cryptography. In strong “quantum access” security models, numerous symmetric-key cryptosystems are also vulnerable. We con...
Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks
identity-based encryption chosen-ciphertext security tight security reductions
2018/11/16
We propose the first identity-based encryption (IBE) scheme that is (almost) tightly secure against chosen-ciphertext attacks. Our scheme is efficient, in the sense that its ciphertext overhead is onl...
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
Attribute-Based Encryption Predicate Encryption
2018/11/16
We provide generic and black box transformations from any chosen plaintext secure Attribute-Based Encryption (ABE) or One-sided Predicate Encryption system into a chosen ciphertext secure system. Our ...
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
simulation-based security selective opening security for receivers chosen-ciphertext attacks
2018/8/21
Security against selective opening attack (SOA) for receivers requires that in a multi-user setting, even if an adversary has access to all ciphertexts, and adaptively corrupts some fraction of the us...
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE
LWE lossy trapdoor functions chosen-ciphertext security
2017/9/14
Selective opening (SO) security refers to adversaries that receive a number of ciphertexts and, after having corrupted a subset of the senders (thus obtaining the plaintexts and the senders' random co...
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks
receiver selective opening chosen ciphertext security hash proof system
2016/12/7
We present a general construction of RSO security against chosen ciphertext attacks (RSO-CCA) by combining any RSO secure scheme against chosen plaintext attacks (RSO-CPA) with any regular CCA secure ...
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
public key encryption key encapsulation mechanism chosen ciphertext security
2016/3/4
In PKC 2014, Dachman-Soled showed a construction of a chosen ciphertext (CCA) secure
public key encryption (PKE) scheme based on a PKE scheme which simultaneously satisfies a security
property calle...
Chosen-Ciphertext Security from Subset Sum
public-key cryptography chosen-ciphertext security subset sum
2016/1/27
We construct a public-key encryption (PKE) scheme whose
security is polynomial-time equivalent to the hardness of the Subset Sum
problem. Our scheme achieves the standard notion of indistinguishabil...
Chosen Ciphertext Security via Point Obfuscation
public key encryption lossy encryption key encapsulation mechanism
2016/1/23
In this paper, we show two new constructions of chosen ciphertext secure (CCA secure) public key encryption (PKE) from general assumptions. The key ingredient in our constructions is an obfuscator for...
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
public key encryption puncturable key encapsulation mechanism chosen ciphertext security
2016/1/4
In this paper, we introduce and study a new cryptographic primitive that we call puncturable key encapsulation
mechanism (PKEM), which is a special class of KEMs that satisfy some functional and secu...
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
identity-based encryption chosen ciphertext security selective opening security
2015/12/31
Security against selective opening attack (SOA) requires that in a multi-user setting, even
if an adversary has access to all ciphertexts from users, and adaptively corrupts some fraction of the
use...
Simple Chosen-Ciphertext Security from Low-Noise LPN
public-key cryptography chosen ciphertext LPN
2015/12/31
Recently, D¨ottling et al. (ASIACRYPT 2012) proposed the
first chosen-ciphertext (IND-CCA) secure public-key encryption scheme
from the learning parity with noise (LPN) assumption. In this work we
...