搜索结果: 1-6 共查到“军事学 Long Term”相关记录6条 . 查询时间(0.125 秒)
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications
digital signatures sanitizable signatures chameleon hashing
font style='font-size:12px;'>
2018/11/6
A chameleon-hash behaves likes a standard collision-resistant hash function for outsiders. If, however, a trapdoor is known, arbitrary collisions can be found. Chameleon-hashes with ephemeral trapdoor...
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions
Long-Term Security Timestamps Preimage Aware Hash Functions
font style='font-size:12px;'>
2017/8/8
Commonly used digital signature schemes have a limited lifetime because their security is based on computational assumptions that will potentially break in the future when more powerful computers are ...
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
unconditionally hiding commitments post-quantum lattice-based cryptography
font style='font-size:12px;'>
2015/12/29
Commitment schemes are among cryptography’s most important
building blocks. Besides their basic properties, hidingness and
bindingness, for many applications it is important that the schemes applied...
Reconfigurable Cryptography: A flexible approach to long-term security
long-term security security definitions public-key cryptography
font style='font-size:12px;'>
2015/12/21
Reconfigurable Cryptography: A flexible approach to long-term security.
Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security
long-term security information-theoretic security corrupted majority
font style='font-size:12px;'>
2009/6/5
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is
infeasible in presence of a corrupted majority in the standard model. On the other hand, t...
Long-term Security and Universal Composability
Universal Composability long-term security zero-knowledge
font style='font-size:12px;'>
2008/12/31
Algorithmic progress and future technology threaten today’s cryptographic
protocols. Long-term secure protocols should not even in future reveal more information
to a—then possibly unlimited—adversa...