搜索结果: 1-8 共查到“军事学 Efficient Constructions”相关记录8条 . 查询时间(0.067 秒)
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Dynamic Searchable Symmetric Encryption Backward Privacy Forward Privacy
2019/5/9
Dynamic Searchable Symmetric Encryption (DSSEDSSE), apart from providing support for search operation, allows a client to perform update operations on outsourced database efficiently. Two security pro...
In this paper we consider both ``OR" and ``XOR" based monochrome random grid visual cryptographic schemes (RGVCS) for tt-(k,n)∗(k,n)∗ access structure which is a generalization of the thre...
More Efficient Constructions for Inner-Product Encryption
inner-product encryption attribute-hiding constant-size ciphertexts
2016/4/12
We propose new constructions for inner product encryption -- IPE1 and IPE2, both secure under the eXternal Diffie-Hellman assumption (SXDH) in asymmetric pairing groups. The first scheme has constant-...
Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary
mPSI mPSI-CA malicious adversary
2016/3/1
In this paper, we propose a construction of fair and efficient mutual Private Set Intersection (mPSI) with linear communication and computation complexities, where the underlying group is of prime ord...
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Attribute-based signatures security definitions traceability
2016/1/23
In this work, we revisit the notion of Decentralized Traceable Attribute-Based Signatures (DTABS) introduced by El Kaafarani et al. (CT-RSA 2014) and improve the state-of-the-art in three dimensions:...
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
Efficient Constructions IND-CCA
2012/3/26
In this paper we consider \emph{anonymity} in the context of Broadcast Encryption (BE). This issue has received very little attention so far and \emph{all but one} of the currently available BE scheme...
On Notions of Security for Deterministic Encryption,and Efficient Constructions without Random Oracles
Public-key encryption deterministic encryption lossy trapdoor functions
2009/6/5
The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07),
who provided the “strongest possible” notion of security for this primitive (called PRIV) and constructi...
Searchable Symmetric Encryption:Improved Definitions and Efficient Constructions
Symmetric Encryption Definition Efficient Constructions
2008/12/1
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to
another party in a private manner, while maintaining the ability to selectively search over it. This probl...