搜索结果: 1-15 共查到“军事学 Verifiability”相关记录22条 . 查询时间(0.062 秒)
Covert Security with Public Verifiability: Faster, Leaner, and Simpler
secure computation covert security
font style='font-size:12px;'>
2018/11/20
The notion of covert security for secure two-party computation serves as a compromise between the traditional semi-honest and malicious security definitions. Roughly, covert security ensures that chea...
Verifiability Analysis of CHVote
voting verifiability mixnet
font style='font-size:12px;'>
2018/11/2
Broadly speaking, both the symbolic and the computational analyses conclude that CH-Vote satisfy the desired security properties under several assumptions. The assumptions include, for example, comput...
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability
electrtonic voting human factors in security verifiability
font style='font-size:12px;'>
2018/7/18
A well-known issue in electronic voting is the risk of manipulation of the cast vote. For countering this risk, a number of methods have been proposed that enable the voter to verify that their cast v...
BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage
Searchable Symmetric Encryption Trusted Hardware Cloud Computing
font style='font-size:12px;'>
2018/6/13
The prevalence and availability of cloud infrastructures has made them the de facto solution for storing and archiving data, both for organizations and individual users. Nonetheless, the cloud's wide ...
Verifiability of Helios Mixnet
election schemes verifiability
font style='font-size:12px;'>
2018/1/12
We study game-based definitions of individual and universal verifiability by Smyth, Frink & Clarkson. We prove that building voting systems from El Gamal coupled with proofs of correct key generation ...
Multi-Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model
Digital Signature Designated Verifier Signature Scheme Multi-Designated Verifiers Signature Scheme
font style='font-size:12px;'>
2017/8/28
In a designated verifier signature (DVS) scheme, the validity of the signature can only be verified by a designated entity chosen by the signer. Furthermore, the designated entity cannot convince a th...
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
Authenticated Encryption Public Verifiability Cloud Computing
font style='font-size:12px;'>
2017/7/24
In this work the first linearly homomorphic authenticated encryption scheme with public verifiability and provable correctness, called LEPCoV, is presented. It improves the initial proposal by avoidin...
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Aggregator Oblivious Encryption Public Verifiability
font style='font-size:12px;'>
2017/5/31
Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can compute an aggregated sum of data and is unable to learn anything else (aggregator obliviousness). Since...
A roadmap to fully homomorphic elections: Stronger security, better verifiability
fully homomorphic encryption remote internet voting quantum-safe
font style='font-size:12px;'>
2017/2/24
After the trials of remote internet voting for local elections in 2011 and parliamentary elections in 2013, a number of local referendums has renewed interest in internet voting in Norway.
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties
e-voting verifiability witness indistinguishability
font style='font-size:12px;'>
2016/12/8
In e-voting protocol design, cryptographers must balance usability and strong security guarantees, such as privacy and verifiability. In traditional e-voting protocols, privacy is often provided by a ...
Verifiability Notions for E-Voting Protocols
e-voting verifiability protocol analysis
font style='font-size:12px;'>
2016/3/18
There have been intensive research efforts in the last two decades or so to design and deploy electronic voting (e-voting) protocols/systems which allow voters and/or external auditors to check that t...
Deleting Secret Data with Public Verifiability
key management smart cards zero knowledge
font style='font-size:12px;'>
2016/1/9
Existing software-based data erasure programs can be summarized as following the same one-bit-return protocol: the deletion program performs data erasure and returns either success or failure. However...
Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
election schemes individual verifiability universal verifiability
font style='font-size:12px;'>
2016/1/3
Definitions of election verifiability in the computational model of cryptography are proposed. The definitions formalize notions of voters verifying their own votes, auditors verifying the tally of vo...
Public Verifiability in the Covert Model (Almost) for Free
secure computation publicly verifiable covert security
font style='font-size:12px;'>
2015/12/21
The covert security model (Aumann and Lindell, TCC 2007) offers an important security/-
efficiency trade-off: a covert player may arbitrarily cheat, but is caught with a certain fixed
probability. T...
Selene: Voting with Transparent Verifiability and Coercion-Mitigation
applications Election Schemes
font style='font-size:12px;'>
2015/12/21
End-to-end verifiable voting schemes typically involves voters
handling an encrypted ballot in order to confirm that their vote is
accurately included in the tally. While this may be technically val...