搜索结果: 1-15 共查到“军事学 Provable Security”相关记录32条 . 查询时间(0.049 秒)
In this work we apply the systematic approach of game-based security specifications and proofs by reductions, to the design and evaluation of public key infrastructure (PKI) schemes. The importance of...
Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures
Provable Security Multi-Signatures
2018/5/11
A multisignature scheme allows a group of signers to collaboratively sign a message, creating a single signature that convinces a verifier that every individual signer approved the message. The increa...
Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet
cryptographic protocols messaging implementation position
2017/10/10
Secure messaging apps have enjoyed huge uptake, and with the headline figure of one billion active WhatsApp users there has been a corresponding burst of academic research on the topic. One might ther...
New Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks
multilinear maps obfuscation CLT13
2017/9/28
We devise the first weak multilinear map model for CLT13 multilinear maps (Coron et al., CRYPTO 2013) that captures all known classical polynomial-time attacks on the maps. We then show important appl...
Many modern block ciphers are constructed based on the paradigm of substitution-permutation networks (SPNs). But, somewhat surprisingly---especially in comparison with Feistel networks, which have bee...
On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks
Tweakable Even-Mansour almost-XOR-universal hash functions multi-key attack
2016/12/29
Cogliati et al. introduced the tweakable Even-Mansour cipher constructed from a single permutation and an almost-XOR-universal (AXU) family of hash functions with tweak and key schedule. Most of previ...
Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach
Lattice-based cryptography post-quantum cryptography authenticated encryption
2016/3/11
Lattice-based cryptography has been received significant attention in the past decade. It has attractive properties such as
being a major post-quantum cryptography candidate, enjoying worst-case to a...
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
Bent Function;Galois ring, Non Linearity
2016/2/23
Bent functions shows some vital properties among all combinatorial objects. Its links in combinatorics, cryptography and coding theory attract the scientific community to construct new class of bent f...
A Provable Security Analysis of Intel's Secure Key RNG
random number generator entropy extraction provable security
2016/1/8
We provide the first provable-security analysis of the Intel Secure Key hardware RNG
(ISK-RNG), versions of which have appeared in Intel processors since late 2011. To model the ISKRNG,
we generaliz...
Online/Off-line Ring Signature Scheme with Provable Security
unforgeability ring members signer anonymity
2016/1/6
The article proposes an Online/Off-line Ring Signature Scheme in random oracle
model.Security of the scheme relies on both Computational Diffie-Hellman and k-CAA
problems. The proposed scheme is pro...
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
block cipher ideal cipher related-key attacks
2016/1/4
The iterated Even-Mansour cipher is a construction of a block cipher from r public permutations P1,…,Pr which abstracts in a generic way the structure of key-alternating ciphers. The indistinguishabil...
How Secure and Quick is QUIC? Provable Security and Performance Analyses
Network security key exchange secure channels
2015/12/29
QUIC is a secure transport protocol developed by Google and implemented in Chrome in
2013, currently representing one of the most promising solutions to decreasing latency while
intending to provide...
Provable Security Proofs and their Interpretation in the Real World
Provable Security EDL Signature Scheme
2014/3/5
This paper analyses provable security proofs, using the EDL signature scheme as its case study, and interprets their benefits and drawbacks when applied to the real world.
Provable security has been...
Limits of provable security for homomorphic encryption
proofs of security homomorphic encryption
2014/3/12
We show that public-key bit encryption schemes which support weak (i.e., compact) homomorphic evaluation of any sufficiently "sensitive" collection of functions cannot be proved message indistinguisha...
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions
Applications / Secure BGP routing protocols path vector protocols
2013/2/21
This paper provides the provable-security treatment of path vector routing protocols. We first design a security definition for routing path vector protocols by studying, generalizing, and formalizing...