搜索结果: 1-3 共查到“军队指挥学 smooth projective hash functions”相关记录3条 . 查询时间(0.109 秒)
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
Cryptographic reverse firewall malleable smooth projective hash function oblivious signature-based envelope
font style='font-size:12px;'>
2016/12/9
Motivated by the revelations of Edward Snowden, post-Snowden cryptography has become a prominent research direction in recent years. In Eurocrypt 2015, Mironov and Stephens-Davidowitz proposed a novel...
Trapdoor Smooth Projective Hash Functions
Authenticated Key Exchange Zero-Knowledge Arguments
font style='font-size:12px;'>
2014/3/12
Katz and Vaikuntanathan recently improved smooth projective hash functions in order to build one-round password-authenticated key exchange protocols (PAKE). To achieve security in the UC framework the...
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange
Authenticated Key Exchange Blind Signatures Smooth Projective Hash Functions
font style='font-size:12px;'>
2013/2/21
Password-Authenticated Key Exchange (PAKE) has received deep attention in the last few years, with a recent improvement by Katz-Vaikuntanathan, and their one-round protocols: the two players just have...