搜索结果: 1-15 共查到“军事学 KDM”相关记录15条 . 查询时间(0.359 秒)
Simple and Efficient KDM-CCA Secure Public Key Encryption
key dependent message security chosen ciphertext security
font style='font-size:12px;'>
2019/9/16
We propose two efficient public key encryption (PKE) schemes satisfying key dependent message security against chosen ciphertext attacks (KDM-CCA security). The first one is KDM-CCA secure with respec...
Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security
LWE standard model Naor-Yung
font style='font-size:12px;'>
2019/8/8
The Naor-Yung paradigm is a well-known technique that constructs IND-CCA2-secure encryption schemes by means of non-interactive zero-knowledge proofs satisfying a notion of simulation-soundness. Until...
CPA-to-CCA Transformation for KDM Security
public-key encryption key-dependent message security chosen ciphertext security
font style='font-size:12px;'>
2019/6/3
We show that chosen plaintext attacks (CPA) security is equivalent to chosen ciphertext attacks (CCA) security for key-dependent message (KDM) security. Concretely, we show how to construct a public-k...
Impossibility of Strong KDM Security with Auxiliary Input
KDM Security Impossibility
font style='font-size:12px;'>
2019/3/21
In this note, we show that a strong notion of KDM security cannot be obtained by any encryption scheme in the auxiliary input setting, assuming Learning With Errors (LWE) and one-way permutations. The...
A Framework for Achieving KDM-CCA Secure Public-Key Encryption
key dependent message security chosen ciphertext security projective hash function
font style='font-size:12px;'>
2018/11/16
We propose a framework for achieving a public-key encryption (PKE) scheme that satisfies key dependent message security against chosen ciphertext attacks (KDM-CCA security) based on projective hash fu...
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption
KDM CI
font style='font-size:12px;'>
2018/2/6
A hash function family is called correlation intractable if for all sparse relations, it is hard to find, given a random function from the family, an input-output pair that satisfies the relation (Can...
KDM-Secure Public-Key Encryption from Constant-Noise LPN
learning parity with noise key-dependent message security public-key encryption
font style='font-size:12px;'>
2017/4/12
The Learning Parity with Noise (LPN) problem has found many applications in cryptography due to its conjectured post-quantum hardness and simple algebraic structure. Over the years, constructions of d...
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
public-key encryption key-dependent messages chosen-ciphertext security
font style='font-size:12px;'>
2016/12/10
KDM[F][F]-CCA secure public-key encryption (PKE) protects the security of message f(sk)f(sk), with f∈Ff∈F, that is computed directly from the secret key, even if the adversary has access to a decrypti...
KDM Security for Identity-Based Encryption: Constructions and Separations
KDM security IBE IB-HPS
font style='font-size:12px;'>
2016/12/8
For encryption schemes, key dependent message (KDM) security requires that ciphertexts preserve secrecy even when the encrypt messages may depend on the secret keys. While KDM security has been extens...
Bounded KDM Security from iO and OWF
obfuscation KDM security key dependent message security
font style='font-size:12px;'>
2016/7/13
To date, all constructions in the standard model (i.e., without random oracles) of Bounded Key-Dependent Message (KDM) secure (or even just circularly-secure) encryption schemes rely on specific assum...
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
Low Noise LPN Key Dependent Message Security LPN Hardness Reduction
font style='font-size:12px;'>
2016/1/5
Cryptographic schemes based on the Learning Parity with Noise (LPN) problem have several
very desirable aspects: Low computational overhead, simple implementation and conjectured
post-quantum hardne...
KDM-Security via Homomorphic Smooth Projective Hashing
public-key cryptography Homomorphic Smooth Projective Hashing
font style='font-size:12px;'>
2015/12/24
We present new frameworks for constructing public-key encryption schemes satisfying key-dependent
message (KDM) security and that yield efficient, universally composable oblivious transfer (OT) proto...
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Signatures Related-Key attack
font style='font-size:12px;'>
2014/3/12
This paper introduces key-versatile signatures. Key-versatile signatures allow us to sign with keys already in use for another purpose, without changing the keys and without impacting the security of ...
RKA-KDM secure encryption from public-key encryption
related key attacks key-dependent message security garbled circuits
font style='font-size:12px;'>
2014/3/7
We construct secret-key encryption (SKE) schemes that are secure against related-key attacks and in the presence of key-dependent messages (RKA-KDM secure). We emphasize that RKA-KDM security is not m...
KDM Security in the Hybrid Framework
KDM Security Hybrid Encryption
font style='font-size:12px;'>
2014/3/10
We study the natural question of how well suited the hybrid encryption paradigm is in the context of key-dependent message (KDM) attacks. We prove that if a key derivation function (KDF) is used in be...