搜索结果: 1-15 共查到“军事学 dynamic”相关记录94条 . 查询时间(0.187 秒)
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Dynamic Searchable Symmetric Encryption Forward Privacy Backward Privacy
font style='font-size:12px;'>
2019/9/19
Dynamic Searchable Symmetric Encryption (DSSE) enables a client to perform updates and searches on encrypted data which makes it very useful in practice. To protect DSSE from the leakage of updates (l...
Balance : Dynamic Adjustment of Cryptocurrency Deposits
cryptocurrency deposit security
font style='font-size:12px;'>
2019/6/10
In cryptoeconomic protocols, financial deposits are fundamental to their security. Protocol designers and their agents face a trade-off when choosing the deposit size. While substantial deposits might...
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
accumulators bitcoin merkle proofs
font style='font-size:12px;'>
2019/6/4
In the Bitcoin consensus network, all nodes come to agreement on the set of Unspent Transaction Outputs (The “UTXO” set). The size of this shared state is a scalability constraint for the network, as ...
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption
attribute-based encryption predicate encryption nested policy
font style='font-size:12px;'>
2019/3/4
We present several transformations that combine a set of attribute-based encryption (ABE) schemes for simpler predicates into a new ABE scheme for more expressive composed predicates. Previous proposa...
CHURP: Dynamic-Committee Proactive Secret Sharing
secret sharing threshold cryptography blockchains
font style='font-size:12px;'>
2019/1/9
We introduce CHURP (CHUrn-Robust Proactive secret sharing). CHURP enables secure secret-sharing in dynamic settings, where the committee of nodes storing a secret changes over time. Designed for block...
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18
Dynamic Cube attack Division Property MILP
font style='font-size:12px;'>
2018/11/6
Recently, another kind of dynamic cube attack is proposed by Fu et al. With some key guesses and a transformation in the output bit, they claim that, when the key guesses are correct, the degree of th...
Membership Privacy for Fully Dynamic Group Signatures
SFPK SPSEQ
font style='font-size:12px;'>
2018/7/9
Group signatures present a trade-off between the traditional goals of digital signatures and the signer's desire for privacy, allowing for the creation of unforgeable signatures in the name of a group...
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Dynamic searchable symmetric encryption forward security backward security
font style='font-size:12px;'>
2018/6/27
Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic tool in the encrypted cloud storage. However, it has been reported that DSSE usually suffers from the file-injection attacks an...
Composable Proof-of-Stake Blockchains with Dynamic Availability
Blockchain Consensus
font style='font-size:12px;'>
2018/5/2
Proof-of-stake-based (in short, PoS-based) blockchains aim to overcome scalability, effi- ciency, and composability limitations of the proof-of-work paradigm, which underlies the security of several m...
Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations
cryptographic protocols secure comparison
font style='font-size:12px;'>
2018/3/6
Within recent years, secure comparison protocols have been proposed using binary decomposition and properties of algebraic fields. These have been repeatedly optimized and increased in efficiency, but...
Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search
Privacy-enhancing technologies dynamic searchable symmetric encryption
font style='font-size:12px;'>
2017/12/25
Dynamic Searchable Symmetric Encryption (DSSE) allows to delegate keyword search and file update over an encrypted database via encrypted indexes, and therefore provides opportunities to mitigate the ...
Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM
Privacy Enhancing Technologies Searchable Encryption Oblivious Random Access Machine (ORAM)
font style='font-size:12px;'>
2017/11/30
Dynamic Searchable Symmetric Encryption (DSSE) allows to delegate search/update operations over encrypted data via an encrypted index. However, DSSE is known to be vulnerable against statistical infer...
Forward Secure Efficient Group Signature in Dynamic Setting using Lattices
Lattice based cryptography Dynamic group signature forward security
font style='font-size:12px;'>
2017/11/28
Secret key exposure is at high risk in the computing infrastructure due to the increase in use of harmful devices. As a result, achieving forward secrecy is a preferable feature for any cryptosystem w...
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
verifiable computation interactive arguments verifiable database queries
font style='font-size:12px;'>
2017/11/28
Cloud database systems such as Amazon RDS or Google Cloud SQL enable the outsourcing of a large database to a server who then responds to SQL queries. A natural problem here is to efficiently verify t...
Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method
Dynamic threshold Linear subspace Forging
font style='font-size:12px;'>
2017/11/14
A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn et.al., in 2015. In this scheme, a (t; n) secret sharing scheme in secret reconstruction phase can t...