搜索结果: 76-90 共查到“知识库 军事学”相关记录15045条 . 查询时间(7.019 秒)
Breaking and Fixing Anonymous Credentials for the Cloud (Full Version)
Attribute-based credentials Privacy-preserving authentication Strong authentication
font style='font-size:12px;'>
2019/9/23
In an attribute-based credential (ABC) system, users obtain a digital certificate on their personal attributes, and can later prove possession of such a certificate in an unlinkable way, thereby selec...
Local Proofs Approaching the Witness Length
PCP IOP
font style='font-size:12px;'>
2019/9/23
Interactive oracle proofs (IOPs) are a hybrid between interactive proofs and PCPs. In an IOP the prover is allowed to interact with a verifier (like in an interactive proof) by sending relatively long...
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing
UC commitment smooth projective hash function SPHF
font style='font-size:12px;'>
2019/9/23
Hash proof systems or smooth projective hash functions (SPHFs) have been proposed by Cramer and Shoup (Eurocrypt'02) and can be seen as special type of zero-knowledge proof system for a language. Whil...
Separating Standard and Asymmetric Password-Authenticated Key Exchange
PAKE Password-Authenticated Key Exchange
font style='font-size:12px;'>
2019/9/23
Password-Authenticated Key Exchange (PAKE) is a method to establish cryptographic keys between two users sharing a low-entropy password. In its asymmetric version, one of the users acts as a server an...
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Commitment schemes subversion security common reference string model
font style='font-size:12px;'>
2019/9/23
A commitment scheme allows a committer to create a commitment to a secret value, and later may open and reveal the secret value in a verifiable manner. In the common reference string model, commitment...
乌蒙山回旋战:绝境中勇闯胜途
乌蒙山 回旋战 勇闯胜途
font style='font-size:12px;'>
2019/10/8
1936年11月,毛泽东谈及红二方面军长征胜利时说:“二、六军团在乌蒙山打转转,不要说敌人,连我们也被你们转昏了头,硬是转出来了嘛!出贵州、过乌江,我们付出了大代价,二、六军团讨了巧,就没有吃亏。你们一万人,走过来还是一万人,没有蚀本,是个了不起的奇迹,是一个大经验,要总结,要大家学。”
Accelerated V2X provisioning with Extensible Processor Platform
V2X SCMS Curve25519
font style='font-size:12px;'>
2019/9/19
With the burgeoning Vehicle-to-Everything (V2X) communication, security and privacy concerns are paramount. Such concerns are usually mitigated by combining cryptographic mechanisms with suitable key ...
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
hardware security logic obfuscation hardware accelerator
font style='font-size:12px;'>
2019/9/19
Existing logic obfuscation approaches aim to protect hardware design IPs from SAT attack by increasing query count and output corruptibility of a locked netlist. In this paper, we demonstrate the inef...
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Password Authentication VANET Group-Key generation
font style='font-size:12px;'>
2019/9/19
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
A Machine-Checked Proof of Security for AWS Key Management Service
Provable-Security Machine-Checked Proof Key Management
font style='font-size:12px;'>
2019/9/19
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS custom...
Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack
Bluetooth elliptic curve cryptosystem Diffie-Hellman
font style='font-size:12px;'>
2019/9/19
Bluetooth is a widely deployed standard for wireless communications between mobile devices. It uses authenticated Elliptic Curve Diffie-Hellman for its key exchange. In this paper we show that the aut...
Verifiable Registration-Based Encryption
Public Key Encryption Registration based Encryption Key Escrow Problem
font style='font-size:12px;'>
2019/9/19
In a recent work, Garg, Hajiabadi, Mahmoody, and Rahimi (TCC 18) introduced a new encryption framework, which they referred to as Registration-Based Encryption (RBE). The central motivation behind RBE...
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Predicate Encryption Bilinear Maps Probabilistic Rank
font style='font-size:12px;'>
2019/9/19
In predicate encryption for a function ff, an authority can create ciphertexts and secret keys which are associated with `attributes'. A user with decryption key KyKy corresponding to attribute yy can...
The Function-Inversion Problem: Barriers and Opportunities
breaking block ciphers forging signatures
font style='font-size:12px;'>
2019/9/19
The task of function inversion is central to cryptanalysis: breaking block ciphers, forging signatures, and cracking password hashes are all special cases of the function-inversion problem. In 1980, H...
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS
succinct arguments universal SRS algebraic holographic proofs
font style='font-size:12px;'>
2019/9/19
We present a methodology to construct preprocessing zkSNARKs where the structured reference string (SRS) is universal and updatable. This exploits a novel use of *holography* [Babai et al., STOC 1991]...