搜索结果: 1-8 共查到“军事学 Efficient Constructions”相关记录8条 . 查询时间(0.078 秒)
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Dynamic Searchable Symmetric Encryption Backward Privacy Forward Privacy
font style='font-size:12px;'>
2019/5/9
Dynamic Searchable Symmetric Encryption (DSSEDSSE), apart from providing support for search operation, allows a client to perform update operations on outsourced database efficiently. Two security pro...
Efficient Constructions for tt-(k,n)∗-Random Grid Visual Cryptographic Schemes
OR XOR
font style='font-size:12px;'>
2017/8/17
In this paper we consider both ``OR" and ``XOR" based monochrome random grid visual cryptographic schemes (RGVCS) for tt-(k,n)∗(k,n)∗ access structure which is a generalization of the thre...
More Efficient Constructions for Inner-Product Encryption
inner-product encryption attribute-hiding constant-size ciphertexts
font style='font-size:12px;'>
2016/4/12
We propose new constructions for inner product encryption -- IPE1 and IPE2, both secure under the eXternal Diffie-Hellman assumption (SXDH) in asymmetric pairing groups. The first scheme has constant-...
Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary
mPSI mPSI-CA malicious adversary
font style='font-size:12px;'>
2016/3/1
In this paper, we propose a construction of fair and efficient mutual Private Set Intersection (mPSI) with linear communication and computation complexities, where the underlying group is of prime ord...
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Attribute-based signatures security definitions traceability
font style='font-size:12px;'>
2016/1/23
In this work, we revisit the notion of Decentralized Traceable Attribute-Based Signatures (DTABS) introduced by El Kaafarani et al. (CT-RSA 2014) and improve the state-of-the-art in three dimensions:...
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
Efficient Constructions IND-CCA
font style='font-size:12px;'>
2012/3/26
In this paper we consider \emph{anonymity} in the context of Broadcast Encryption (BE). This issue has received very little attention so far and \emph{all but one} of the currently available BE scheme...
On Notions of Security for Deterministic Encryption,and Efficient Constructions without Random Oracles
Public-key encryption deterministic encryption lossy trapdoor functions
font style='font-size:12px;'>
2009/6/5
The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07),
who provided the “strongest possible” notion of security for this primitive (called PRIV) and constructi...
Searchable Symmetric Encryption:Improved Definitions and Efficient Constructions
Symmetric Encryption Definition Efficient Constructions
font style='font-size:12px;'>
2008/12/1
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to
another party in a private manner, while maintaining the ability to selectively search over it. This probl...