搜索结果: 1-15 共查到“军事学 New Approach”相关记录15条 . 查询时间(0.081 秒)
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
digital signatures hash functions public-key cryptography
font style='font-size:12px;'>
2019/6/10
A new hash-based, server-supported digital signature scheme was proposed recently. We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the ...
A New Approach to Modelling Centralised Reputation Systems
group signatures direct anonymous attestation reputation systems
font style='font-size:12px;'>
2019/5/9
A reputation system assigns a user or item a reputation value which can be used to evaluate trustworthiness. Bl{\"o}mer, Juhnke and Kolb in 2015, and Kaafarani, Katsumata and Solomon in 2018, gave for...
A New Approach to Deanonymization of Unreachable Bitcoin Nodes
Anonymity Bitcoin
font style='font-size:12px;'>
2018/3/9
Mounting deanonymization attacks on the unreachable Bitcoin nodes -- these nodes do not accept incoming connections -- residing behind the NAT is a challenging task. Such an attack was first given by ...
A New Approach to Black-Box Concurrent Secure Computation
black-box construction concurrent security multi-party computation
font style='font-size:12px;'>
2018/3/7
We consider the task of constructing concurrently composable protocols for general secure computation by making only black-box use of underlying cryptographic primitives. Existing approaches for this ...
Multiplication and Division over Extended Galois Field GF(pqpq): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF(pqpq).
Galois Field Finite field Irreducible Polynomials (IPs)
font style='font-size:12px;'>
2017/6/9
Irreducible Polynomials (IPs) have been of utmost importance in generation of substitution boxes in modern cryptographic ciphers. In this paper an algorithm entitled Composite Algorithm using both mul...
New Approach to Practical Leakage-Resilient Public-Key Cryptography
leakage-resilient public-key encryption key exchange protocols
font style='font-size:12px;'>
2017/5/25
We present a new approach to construct several leakage-resilient cryptographic primitives, including public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key...
A New Approach to Round-Optimal Secure Multiparty Computation
DDH MPC
font style='font-size:12px;'>
2017/5/11
We present a new approach towards constructing round-optimal secure multiparty computation (MPC) protocols against malicious adversaries without trusted setup assumptions. Our approach builds on ideas...
A New Approach for Practical Function-Private Inner Product Encryption
Functional encryption inner product encryption function privacy
font style='font-size:12px;'>
2017/2/20
Functional Encryption (FE) is a new paradigm supporting restricted decryption keys of function ff that allows one to learn f(xj)f(xj) from encryptions of messages xjxj. A natural and practical securit...
THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS
secret-key cryptography stream ciphers geometry number theory
font style='font-size:12px;'>
2016/1/6
This article describes a novel and unique cryptosystem making use of a small set of private
security parameters and public initialization values to produce a pseudorandom byte stream with large
peri...
A New Approach to Practical Active-Secure Two-Party Computation
cryptographic protocols
font style='font-size:12px;'>
2012/3/29
We propose a new approach to practical two-party computation secure against an active adversary. All prior practical protocols were based on Yao's garbled circuits. We use an OT-based approach and get...
A New Approach to Practical Active-Secure Two-Party Computation
A New Approach Practical Active-Secure Two-Party Computation
font style='font-size:12px;'>
2011/3/10
We propose a new approach to practical two-party computation secure against an active
adversary. All prior practical protocols were based on Yao’s protocol.We use an OT-based approach and
get effici...
A new approach for FCSRs
Stream cipher FCSRs ring FCSRs
font style='font-size:12px;'>
2009/6/12
Feedback with Carry Shift Registers (FCSRs) have been
proposed as an alternative to Linear Feedback Shift Registers (LFSRs)
for the design of stream ciphers. FCSRs have good statistical properties
...
A New Approach for Algebraically Homomorphic Encryption
Algebraically Homomorphic Encryption Coding Theory Provable Security
font style='font-size:12px;'>
2009/6/9
The existence of an efficient and provably secure algebraically homomorphic scheme (AHS),
i.e., one that supports both addition and multiplication operations, is a long stated open problem. All
prop...
A New Approach to Secure Logging
secure logging MACs signatures forward secure stream integrity
font style='font-size:12px;'>
2009/6/4
The need for secure logging is well-understood by the security professionals,
including both researchers and practitioners. The ability to efficiently
verify all (or some) log entries is important t...
A New Approach to Prevent Blackmailing in E-Cash
Fair Electronic Cash General Blackmailing Group Blind Signature
font style='font-size:12px;'>
2009/4/8
Blackmailing may be the most serious drawback of the known electronic
cash systems offering unconditional anonymity. Recently, D.Kugler proposed an
on-line payment system without trusted party to pr...