搜索结果: 1-15 共查到“军事学 Forward Security”相关记录15条 . 查询时间(0.125 秒)
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
session resumption forward secrecy 0-RTT
font style='font-size:12px;'>
2019/3/4
The TLS 1.3 0-RTT mode enables a client reconnecting to a server to send encrypted application-layer data in "0-RTT" ("zero round-trip time"), without the need for a prior interactive handshake. This ...
File-injection Attack and Forward Security for Order-revealing Encryption
Order-revealing Encryption Order-preserving Encryption File-injection Attack
font style='font-size:12px;'>
2017/11/13
Order-preserving encryption (OPE) and order-revealing encryption (ORE) are among the core ingredients for encrypted database (EDB) systems as secure cloud storage. In this work, we study the leakage o...
Forward-Security under Continual Leakage
leakage-resilient cryptography forward security digital signatures
font style='font-size:12px;'>
2017/5/31
Current signature and encryption schemes secure against continual leakage fail completely if the key in any time period is fully exposed. We suggest forward security as a second line of defense, so th...
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
symmetric searchable encryption provable security secret-key cryptography
font style='font-size:12px;'>
2016/1/27
Symmetric Searchable Encryption (SSE) is a very efficient and practical way for data owners to outsource
storage of a database to a server while providing privacy guarantees. Such SSE schemes enable
...
Towards Forward Security Properties for PEKS and IBE
PEKS IBE Forward Secrecy
font style='font-size:12px;'>
2016/1/8
In cryptography, forward secrecy is a well-known property for
key agreement protocols. It ensures that a session key will remain private
even if one of the long-term secret keys is compromised in th...
One-Round Deniable Key Exchange with Perfect Forward Security
Authenticated Key Exchange Perfect Forward Secrecy Full Deniability
font style='font-size:12px;'>
2016/1/7
In response to the need for secure one-round authenticated key exchange protocols providing both perfect
forward secrecy and full deniability, we put forward a new paradigm for constructing protocols...
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
Authenticated key exchange eCK model Perfect forward security Provably secure
font style='font-size:12px;'>
2011/7/25
This paper investigates the two-pass authenticated key exchange protocol in the enhanced Canetti-Krawczyk (eCK) with perfect forward security.
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
cryptographic protocols
font style='font-size:12px;'>
2012/3/27
This paper investigates the two-pass authenticated key exchange protocol in the enhanced Canetti-Krawczyk (eCK) with perfect forward security. Currently, there exist no authenticated key exchange prot...
Strong Forward Security in Identity-Based Signcryption
public-key cryptography / forward security signcryption pairing-based cryptography identity-based cryptography
font style='font-size:12px;'>
2012/3/29
Due to the possibility of key exposure, forward security in encryption and signing has been well studied, especially in the identity-based setting where an entity's public key is that entity's name. F...
Forward Security in Threshold Signature Schemes
threshold cryptography forward security signature schemes
font style='font-size:12px;'>
2009/4/17
We consider the usage of forward security with threshold signature schemes. This means that even
if more than the threshold number of players are compromised, some security remains: it is not possibl...
Forward-Security in Private-Key Cryptography
Symmetric cryptography forward security pseudorandom bit generators
font style='font-size:12px;'>
2009/4/16
This paper provides a comprehensive treatment of forward-security in the context of shared-
key based cryptographic primitives, as a practical means to mitigate the damage caused by
key-exposure. We...
From Identification to Signatures via the Fiat-Shamir Transform:Minimizing Assumptions for Security and Forward-Security
Signature schemes identification schemes Fiat-Shamir transform
font style='font-size:12px;'>
2009/4/13
The Fiat-Shamir paradigm for transforming identification schemes into signature schemes
has been popular since its introduction because it yields efficient signature schemes, and has
been receiving ...
On the Security of a Group Signature Scheme with Forward Security
digital signature group signature forward security cryptanalysis
font style='font-size:12px;'>
2009/4/10
A group signature scheme allows a group member of a given group to sign messages
on behalf of the group in an anonymous and unlinkable way. In case of a
dispute, however, a designated group manager ...
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
ID-Based Encryption Complex Hierarchies Forward Security Broadcast Encryption
font style='font-size:12px;'>
2009/3/27
vA forward-secure encryption scheme protects secret keys from exposure by evolving the
keys with time. Forward security has several unique requirements in hierarchical identity-based
encryption (HIB...
Logcrypt:Forward Security and Public Verification for Secure Audit Logs
Logcrypt Forward Security Public Verification Secure Audit Logs
font style='font-size:12px;'>
2009/1/12
Logcrypt provides strong cryptographic assurances
that data stored by a logging facility before a system
compromise cannot be modified after the compromise
without detection. We build on prior work...