搜索结果: 1-14 共查到“军事学 generic constructions”相关记录14条 . 查询时间(0.125 秒)
Robustly reusable Fuzzy Extractor (rrFE) considers reusability and robustness simultaneously. We present two approaches to the generic construction of rrFE. Both of approaches make use of a secure ske...
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
Identity-based encryption Bounded-CCA security
2016/1/26
Identity-based encryption (IBE) is a special case of public-key encryption where
user identities replace public keys. Every user is given a corresponding secret key for decryption,
and encryptions f...
Point-Function Obfuscation: A Framework and Generic Constructions
point-function obfuscation indistinguishability obfuscation one-way functions
2015/12/25
We give a definitional framework for point-function obfuscation in which security is parameterized
by a class of algorithms we call target generators. Existing and new notions are captured
and expla...
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
KDM Security circular security leakage resilience
2015/12/24
Abstract. We propose generic constructions of public-key encryption schemes, satisfying key- dependent message (KDM) security for projections and different forms of key-leakage resilience, from CPA-se...
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions
Cryptographic Protocols Oblivious RAM
2015/12/21
Oblivious RAM (ORAM) garbles read/write operations by a
client (to access a remote storage server or a random-access memory) so
that an adversary observing the garbled access sequence cannot infer a...
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
Adaptive Security Anonymous Identity-Based Encryption
2014/3/12
For searching keywords against encrypted data, the public key encryption scheme with keyword search (PEKS), and its an extension called secure-channel free PEKS (SCF-PEKS) have been proposed. In SCF-P...
Generic Constructions for Verifiable Signcryption
cryptographic protocols / signcryption sign-then-encrypt paradigm commit-then-encrypt-and sign paradigm encrypt-then-sign paradigm
2012/6/14
Signcryption is a primitive which simultaneously performs the functions of both signature and encryption in a way that is more efficient than signing and encrypting separately. We study in this paper ...
Generic Constructions for Verifiable Signcryption
cryptographic protocols / signcryption sign-then-encrypt paradigm commit-then-encrypt-and sign paradigm encrypt-then-sign paradigm (public) verifiability homomorphic encryption
2012/3/22
Signcryption is a primitive which simultaneously performs the functions of both signature and encryption in a way that is more efficient than signing and encrypting separately. We study in this paper ...
Generic Constructions for Verifiable Signcryption
cryptographic protocols / signcryption sign-then-encrypt paradigm commit-then-encrypt-and sign paradigm encrypt-then-sign paradigm (public) verifiability homomorphic encryption
2012/3/21
Signcryption is a primitive which simultaneously performs the functions of both signature and encryption in a way that is more efficient than signing and encrypting separately. We study in this paper ...
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes
key exposure parallel key-insulated encryption one-time forward secure public key encryption identity-based encryption
2010/9/9
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete key-insulated encryptio...
On Generic Constructions of Designated Confirmer Signatures - II(The “Signature of a Commitment” Paradigm Revisited)
Designated Confirmer signatures “Signature of a commitment” paradigm Generic construction
2009/9/11
Generic constructions of designated confirmer signatures follow one of the following two strategies;
either produce a digital signature on the message to be signed, then encrypt the resulting signatu...
On Generic Constructions of Designated Confirmer Signatures (The “Encryption of a Signature” Paradigm Revisited)
Designated Confirmer signatures “Encryption of a signature” paradigm Generic construction
2009/8/25
Designated Confirmer signatures were introduced to limit the verification property inherent to digital
signatures. In fact, the verification in these signatures is replaced by a confirmation/denial p...
Security Notions and Generic Constructions for Client Puzzles
Security Notions Generic Constructions Client Puzzles
2009/7/14
Computational puzzles are mildly difficult computational problems that require resources (processor
cycles, memory, or both) to solve. Puzzles have found a variety of uses in security. In this paper ...
Generic Constructions of Identity-Based and Certificateless KEMs
Generic Constructions Identity-Based Certificateless KEMs
2009/1/19
We extend the concept of key encapsulation mechanisms to
the primitives of ID-based and certificateless encryption. We show that
the natural combination of ID-KEMs or CL-KEMs with data encapsulation...