搜索结果: 1-4 共查到“军事学 key cycles”相关记录4条 . 查询时间(0.146 秒)
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
Circular Security every IND-CPA cryptosystem
2017/2/20
One interesting question is whether circular security comes for free from IND-CPA security. Recent works have addressed this question, showing that for all integers n, there exists an IND-CPA scheme t...
Separations in Circular Security for Arbitrary Length Key Cycles
Separations Arbitrary Length Key Cycles
2014/3/6
While standard notions of security suffice to protect any message supplied by an adversary, in some situations stronger notions of security are required. One such notion is n-circular security, where ...
Co-induction and Computational Semantics for Public-key Encryption with Key Cycles
Computational soundness and completeness greatest fixed-points least fixed points weak public-key indistinguishability strong public-key indistinguishability
2011/2/24
We consider the computational soundness and completeness of formal indistinguishability in public-key cryptography, in the presence of key-cycles. This problem in the absence of key-cycles is addresse...
Computational Soundness about Formal Encryption in Presence of Secret Shares and Key Cycles
key cycles secret sharing computational soundness
2010/9/9
The computational soundness of formal encryption is researched extensively after the work by Abadi and Rogaway. A recent work by Abadi and Warinschi extends this work to a scenario in which secret sha...