搜索结果: 1-8 共查到“军事学 token”相关记录8条 . 查询时间(0.093 秒)
Privacy-preserving auditable token payments in a permissioned blockchain system
cryptographic protocols AML
font style='font-size:12px;'>
2019/9/19
Token management systems were the first application of blockchain technology and are still the most widely used one. Early implementations such as Bitcoin or Ethereum provide virtually no privacy beyo...
Implementing Token-Based Obfuscation under (Ring) LWE
implementation lattice techniques token-based program obfuscation
font style='font-size:12px;'>
2019/1/2
Token-based obfuscation (TBO) is an interactive approach to cryptographic program obfuscation that was proposed by Goldwasser et al. as a potentially more practical alternative to conventional non-int...
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token
anonymity digital signatures pseudonym
font style='font-size:12px;'>
2018/12/3
In this paper we present an extension of Pseudonymous Signature introduced by the German Federal BSI authority as a part of technical recommendations for electronic identity documents. Without switchi...
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model
tamper-proof token corruptible setup assumption
font style='font-size:12px;'>
2017/11/13
In this work we introduce the corruptible token model. This model generalizes the stateless tamper-proof token model introduced by Katz (EUROCRYPT '07) and relaxes the trust assumption. Our improved m...
Round-Optimal Token-Based Secure Computation
Secure Computation Tamper-Proof Hardware Round Complexity
font style='font-size:12px;'>
2015/12/23
Secure computation in the presence of tamper-proof hardware tokens is proven under the assumption that the holder of the token is only given black-box access to the functionality of the token. Startin...
Lower Bounds in the Hardware Token Model
Lower Bounds Hardware Token Model
font style='font-size:12px;'>
2014/3/5
We study the complexity of secure computation in the tamper-proof hardware token model. Our main focus is on non-interactive unconditional two-party computation using bit-OT tokens, but we also study ...
On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage
Yao circuits side-channel attacks leakage-resilien mobile/embedded tokens AES HMAC SHA
font style='font-size:12px;'>
2013/4/18
Within a broader context of mobile and embedded computing, the design of practical, secure tokens that can store and/or process security-critical information remains an ongoing challenge. One aspect o...
Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number
Authenticated key exchange pairing-based cryptosystems
font style='font-size:12px;'>
2009/4/15
Authenticated key exchange protocols tend to be either to-
ken based or password based. Token based schemes are often based on
expensive (and irreplaceable) smart-card tokens, while password-only
s...