搜索结果: 1-15 共查到“军事学 hiding”相关记录50条 . 查询时间(0.062 秒)
On the Difficulty of Hiding the Balance of Lightning Network Channels
Bitcoin Blockchain Network Security
2019/4/1
The Lightning Network is a second layer technology running on top of Bitcoin and other Blockchains. It is composed of a peer-to-peer network, used to transfer raw information data. Some of the links i...
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
attribute based signature anonymous credentials threshold cryptography
2019/3/1
In this work, we revisit multi-authority attribute based signatures (MA-ABS), and elaborate on the limitations of the current MA-ABS schemes to provide a hard to achieve (yet very useful) combination ...
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
functional encryption inner product tight security
2019/2/27
Tightly secure cryptographic schemes have been extensively studied in the fields of chosen-ciphertext secure public-key encryption (CCA-secure PKE), identity-based encryption (IBE), signature and more...
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Searchable Encryption Hidden Vector Encryption Leakage Profile
2018/12/3
The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken new ground in designing efficient searchable symmetric encryption (SSE) protocol with support for conjunctive keyword...
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
public-key cryptography Full Attribute-hiding
2018/11/16
In this work, we propose two IPE schemes achieving both adaptive security and full attribute-hiding in the prime-order bilinear group, which improve upon the unique existing result satisfying both fea...
Strong Leakage Resilient Encryption by Hiding Partial Ciphertext
Leakage Resillient Encryption Steal Resillient Encryption Secret Sharing
2018/11/16
Leakage-resilient encryption is a powerful tool to protect data confidentiality against side channel attacks. In this work, we introduce a new and strong leakage setting to counter backdoor (or trojan...
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
predicate encryption partially-hiding simulation-based adaptive security
2018/11/13
This paper demonstrates how to achieve simulation-based strong attribute hiding against adaptive adversaries for predicate encryption (PE) schemes supporting expressive predicate families under standa...
Proofs of Ignorance and Applications to 2-Message Witness Hiding
Witness Hiding Witness Indistinguishability Zero Knowledge
2018/11/9
We consider the following paradoxical question: Can one prove lack of knowledge? We define the notion of Proofs of Ignorance, construct such proofs, and use these proofs to construct a 2-message witne...
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
public-key cryptography attribute-based encryption
2018/8/21
Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and po...
Definitions for Plaintext-Existence Hiding in Cloud Storage
Cloud Storage Side-channel analysis Information Leakage
2018/8/20
Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client si...
Parameter-Hiding Order Revealing Encryption
secret-key cryptography Order Revealing Encryption
2018/7/24
Order-revealing encryption (ORE) is a popular primitive for outsourcing encrypted databases, as it allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works...
Context Hiding Multi-Key Linearly Homomorphic Authenticators
Delegated Computation Homomorphic Authenticators Context Hiding
2018/6/27
Demanding computations are increasingly outsourced to cloud platforms. For such outsourced computations, the efficient verifiability of results is a crucial requirement. When sensitive data is involve...
Topology-Hiding Computation Beyond Semi-Honest Adversaries
topology-hiding broadcast topology-hiding computation fail-stop
2018/3/8
Topology-hiding communication protocols allow a set of parties, connected by an incomplete network with unknown communication graph, where each party only knows its neighbors, to construct a complete ...
Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption
multi-input functional encryption inner products full-hiding security
2018/1/17
This paper presents two non-generic and practically efficient private key multi-input functional encryption (MIFE) schemes for the multi-input version of the inner product functionality that are the f...
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings
Functional Encryption multi-input inner-product
2017/10/9
We present new constructions of multi-input functional encryption (MIFE) schemes for the inner-product functionality that improve the state of the art solution of Abdalla et al. (Eurocrypt 2017) in tw...