军事学 >>> 军事学 >>> 军队指挥学 >>> 作战指挥 军事系统工程 军事通信学 军事情报学 密码学 军队指挥学其他学科
搜索结果: 1-14 共查到军队指挥学 secure encryption相关记录14条 . 查询时间(0.078 秒)
In this paper, we introduce Saber, a package of cryptographic primitives whose security relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first describe a secure Diffie...
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption     KDM  CI       font style='font-size:12px;'> 2018/2/6
A hash function family is called correlation intractable if for all sparse relations, it is hard to find, given a random function from the family, an input-output pair that satisfies the relation (Can...
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes     KDM security  IBE  LPN       font style='font-size:12px;'> 2017/10/9
Finally, we show that the notion of one-time signatures with encryption is also useful for the construction of key-dependent-message (KDM) secure public-key encryption. In particular, our results impl...
We show how to transform any semantically secure encryption scheme into a non-malleable one, with a black-box construction that achieves a quasi-linear blow-up in the size of the ciphertext. This impr...
Tightly Secure CCA-Secure Encryption without Pairings     public-key encryption  CCA security  tightness       font style='font-size:12px;'> 2016/2/23
We present the first CCA-secure public-key encryption scheme based on DDH where the security loss is independent of the number of challenge ciphertexts and the number of decryption queries. Our cons...
To gain strong confidence in the security of a public-key scheme, it is most desirable for the security proof to feature a tight reduction between the adversary and the algorithm solving the underlyi...
Lattice-based encryption schemes still suffer from a low message throughput per ciphertext. This is mainly due to the fact that the underlying schemes do not tap the full potentials of LWE. Many cons...
We construct secret-key encryption (SKE) schemes that are secure against related-key attacks and in the presence of key-dependent messages (RKA-KDM secure). We emphasize that RKA-KDM security is not m...
Verifiability is central to building protocols and systems with integrity. Initially, efficient methods employed the Fiat-Shamir heuristics. Since 2008, the Groth-Sahai techniques have been the most e...
While CCA secure encryption schemes that provide ciphertext indistinguishability offer strongest form of message secrecy, the integrity of the ciphertext is often overlooked.
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations.
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not use hash-functions o...
Circular-Secure Encryption Beyond Affine Functions     Circular-Secure Encryption  Affine Functions       font style='font-size:12px;'> 2009/10/9
We show that for any constant d 2 N, there exists a public-key encryption scheme that can securely encrypt any function f of its own secret-key, assuming f can be expressed as a polynomial of total ...
We put forward the new abstract framework of hard algebraic set systems that allows to construct ecient chosen-ciphertext secure encryption schemes under computational (rather than decisional) intr...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...