搜索结果: 1-14 共查到“军事学 Confidentiality”相关记录14条 . 查询时间(0.078 秒)
Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions
Zero-knowledge Proofs Confidential Transactions Zcoin
font style='font-size:12px;'>
2019/4/15
We propose Lelantus, a new anonymous payment system which ensures both transaction confidentiality and anonymity with small proof sizes, short verification times and without requiring a trusted setup.
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
OCB2 Authenticated Encryption Cryptanalysis
font style='font-size:12px;'>
2019/3/21
We present practical attacks on OCB2. This mode of operation of a blockcipher was designed with the aim to provide particularly efficient and provably-secure authenticated encryption services, and sin...
libInterMAC: Beyond Confidentiality and Integrity in Practice
fragmentation attack SSH Authenticated Encryption
font style='font-size:12px;'>
2019/2/25
Boldyreva et al. (Eurocrypt 2012) defined a fine-grained security model capturing ciphertext fragmentation attacks against symmetric encryption schemes. The model was extended by Albrecht et al. (CCS ...
Identity Confidentiality in 5G Mobile Telephony Systems
Anonymity Privacy 5G
font style='font-size:12px;'>
2018/11/13
The 3rd Generation Partnership Project (3GPP) recently proposed a standard for 5G telecommunications, containing an identity protection scheme meant to address the long-outstanding privacy problem of ...
Breaking the confidentiality of OCB2
OCB2 confidentiality attack
font style='font-size:12px;'>
2018/11/12
OCB2 is a widely standardized mode of operation of a blockcipher that aims at providing authenticated encryption. A recent report by Inoue and Minematsu (IACR EPRINT report 2018/1040) indicates that O...
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
PKG IND CCA
font style='font-size:12px;'>
2017/3/6
ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certificate management like Public Key Infr...
A QKD-based digital archiving solution providing everlasting confidentiality and integrity
QKD secret sharing commitments
font style='font-size:12px;'>
2016/12/12
With increasing digitization, the amount of archived data that requires long-term protection of confidentiality and integrity increases rapidly. Examples include electronic health records, genome data...
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Collaborative filtering Outsourcing Integrity
font style='font-size:12px;'>
2016/2/24
In the cloud computing era, in order to avoid the computational burdens, many recommendation service providers tend to outsource their collaborative filtering computations to third-party cloud servers...
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
network homomorphic WSN Wireless Sensor Network
font style='font-size:12px;'>
2015/12/22
Wireless Sensor Networks (WSN) has become more
and more important in many applications especially those required
a high level of security such as: commercial, military
and telemedicine applications...
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
Data confidentiality multi-tenancy audit-trail log
font style='font-size:12px;'>
2015/12/18
Cloud computing is delivery of services rather
than a product and among different cloud deployment models,
the public cloud provides improved scalability and cost reduction
when compared to others....
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
attribute-based encryption encrypted search
font style='font-size:12px;'>
2011/1/18
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are sent to intereste...
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
attribute-based encryption encrypted search
font style='font-size:12px;'>
2012/3/30
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are sent to intereste...
Grey-Box Implementation of Block Ciphers Preserving the Confidentiality of their Design
design confidentiality BDDs
font style='font-size:12px;'>
2009/3/27
In 1997, Patarin and Goubin introduce new asymmetric
cryptosystems based on the diÆculty of recovering two systems of mul-
tivariate polynomials from their composition. We make a dierent use
...
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Modes of operation PRP-RKA KASUMI security proofs
font style='font-size:12px;'>
2009/3/20
This paper analyses the 3GPP confidentiality and integrity schemes adopted by Universal
Mobile Telecommunication System, an emerging standard for third generation wireless communications.The schemes,...