搜索结果: 1-15 共查到“密码学 hiding”相关记录50条 . 查询时间(0.031 秒)
On the Difficulty of Hiding the Balance of Lightning Network Channels
Bitcoin Blockchain Network Security
font style='font-size:12px;'>
2019/4/1
The Lightning Network is a second layer technology running on top of Bitcoin and other Blockchains. It is composed of a peer-to-peer network, used to transfer raw information data. Some of the links i...
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
attribute based signature anonymous credentials threshold cryptography
font style='font-size:12px;'>
2019/3/1
In this work, we revisit multi-authority attribute based signatures (MA-ABS), and elaborate on the limitations of the current MA-ABS schemes to provide a hard to achieve (yet very useful) combination ...
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
functional encryption inner product tight security
font style='font-size:12px;'>
2019/2/27
Tightly secure cryptographic schemes have been extensively studied in the fields of chosen-ciphertext secure public-key encryption (CCA-secure PKE), identity-based encryption (IBE), signature and more...
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Searchable Encryption Hidden Vector Encryption Leakage Profile
font style='font-size:12px;'>
2018/12/3
The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken new ground in designing efficient searchable symmetric encryption (SSE) protocol with support for conjunctive keyword...
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
public-key cryptography Full Attribute-hiding
font style='font-size:12px;'>
2018/11/16
In this work, we propose two IPE schemes achieving both adaptive security and full attribute-hiding in the prime-order bilinear group, which improve upon the unique existing result satisfying both fea...
Strong Leakage Resilient Encryption by Hiding Partial Ciphertext
Leakage Resillient Encryption Steal Resillient Encryption Secret Sharing
font style='font-size:12px;'>
2018/11/16
Leakage-resilient encryption is a powerful tool to protect data confidentiality against side channel attacks. In this work, we introduce a new and strong leakage setting to counter backdoor (or trojan...
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
predicate encryption partially-hiding simulation-based adaptive security
font style='font-size:12px;'>
2018/11/13
This paper demonstrates how to achieve simulation-based strong attribute hiding against adaptive adversaries for predicate encryption (PE) schemes supporting expressive predicate families under standa...
Proofs of Ignorance and Applications to 2-Message Witness Hiding
Witness Hiding Witness Indistinguishability Zero Knowledge
font style='font-size:12px;'>
2018/11/9
We consider the following paradoxical question: Can one prove lack of knowledge? We define the notion of Proofs of Ignorance, construct such proofs, and use these proofs to construct a 2-message witne...
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
public-key cryptography attribute-based encryption
font style='font-size:12px;'>
2018/8/21
Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and po...
Definitions for Plaintext-Existence Hiding in Cloud Storage
Cloud Storage Side-channel analysis Information Leakage
font style='font-size:12px;'>
2018/8/20
Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client si...
Parameter-Hiding Order Revealing Encryption
secret-key cryptography Order Revealing Encryption
font style='font-size:12px;'>
2018/7/24
Order-revealing encryption (ORE) is a popular primitive for outsourcing encrypted databases, as it allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works...
Context Hiding Multi-Key Linearly Homomorphic Authenticators
Delegated Computation Homomorphic Authenticators Context Hiding
font style='font-size:12px;'>
2018/6/27
Demanding computations are increasingly outsourced to cloud platforms. For such outsourced computations, the efficient verifiability of results is a crucial requirement. When sensitive data is involve...
Topology-Hiding Computation Beyond Semi-Honest Adversaries
topology-hiding broadcast topology-hiding computation fail-stop
font style='font-size:12px;'>
2018/3/8
Topology-hiding communication protocols allow a set of parties, connected by an incomplete network with unknown communication graph, where each party only knows its neighbors, to construct a complete ...
Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption
multi-input functional encryption inner products full-hiding security
font style='font-size:12px;'>
2018/1/17
This paper presents two non-generic and practically efficient private key multi-input functional encryption (MIFE) schemes for the multi-input version of the inner product functionality that are the f...
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings
Functional Encryption multi-input inner-product
font style='font-size:12px;'>
2017/10/9
We present new constructions of multi-input functional encryption (MIFE) schemes for the inner-product functionality that improve the state of the art solution of Abdalla et al. (Eurocrypt 2017) in tw...