搜索结果: 1-6 共查到“军事学 deniability”相关记录6条 . 查询时间(0.093 秒)
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
secure messaging mobile messaging
font style='font-size:12px;'>
2018/11/16
In this paper, we describe Mobile CoWPI, a deployable, end-to-end secure mobile group messaging application with proofs of security. Mobile CoWPI allows dynamic groups of users to participate in, join...
On The Use of Remote Attestation to Break and Repair Deniability
deniable protocols OTR
font style='font-size:12px;'>
2018/5/11
Deniable messaging protocols allow two parties to have `off-the-record' conversations without leaving any record that can convince external verifiers about what either of them said during the conversa...
Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication
deniability anonymity anonymous authentication
font style='font-size:12px;'>
2016/1/7
In the problem of anonymous authentication (Boneh et al. CCS 1999), a sender wishes
to authenticate a message to a given recipient in a way that preserves anonymity: the recipient does
not know the ...
Group Signature with Deniability: How to Disavow a Signature
group signature deniability non-interactive zero-knowledge proof
font style='font-size:12px;'>
2016/1/4
Group signatures are a class of digital signatures with enhanced privacy. By using this type of
signature, a user can sign a message on behalf of a specific group without revealing his identity, but ...
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability
cryptographic protocols / Key Exchange Perfect Forward Secrecy Deniability PKI
font style='font-size:12px;'>
2012/3/28
Traditionally, secure one-round key exchange protocols in the PKI setting have either achieved perfect forward secrecy, or forms of deniability, but not both. On the one hand, achieving perfect forwar...
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability
cryptographic protocols Key Exchange Perfect Forward Secrecy
font style='font-size:12px;'>
2011/7/25
Traditionally, secure one-round key exchange protocols in the PKI setting have either achieved perfect forward secrecy, or forms of deniability, but not both.