搜索结果: 1-9 共查到“军事学 Position”相关记录9条 . 查询时间(0.158 秒)
Position-Based Cryptography and Multiparty Communication Complexity
Position based cryptography construct secure
2016/6/2
Position based cryptography (PBC), proposed in the seminal work of Chandran, Goyal,
Moriarty, and Ostrovsky (SIAM J. Computing, 2014), aims at constructing cryptographic schemes
in which the identit...
Quantum position verification in the random oracle model
Position-verification quantum cryptography random oracles
2016/1/25
We present a quantum position verification scheme in the random
oracle model. In contrast to prior work, our scheme does not require bounded
storage/retrieval/entanglement assumptions. We also give ...
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games
foundations quantum cryptography
2016/1/3
A serious concern with quantum key distribution (QKD)
schemes is that, when under attack, the quantum devices in a real-life
implementation may behave differently than modeled in the security
proof...
The mission of theoretical cryptography is to define and construct provably secure cryptographic protocols and schemes. Without proofs of security, cryptographic constructs offer no guarantees whatsoe...
We propose an collusion-attack-resistant position-verification protocol in a new model called multi-channel model. In the multi-channel model, there are lots of communication channels. When a player p...
Position-Verification in Multi-Channel Models
cryptographic protocols:Multi-channel model Position-verification
2012/3/20
We propose an collusion-attack-resistant position-verification protocol in a new model called multi-channel model. In the multi-channel model, there are lots of communication channels. When a player p...
We propose an collusion-attack-resistant position-verification protocol in a new model called multi-channel model. In the multi-channel model, there are lots of communication channels. When a player p...
In this work, we initiate the study of position-based cryptography in the quantum setting. The aim of position-based cryptography is to use the geographical position of a party as its only credential....
We consider what constitutes identities in cryptography. Typical examples include your name and
your social-security number, or your ¯ngerprint/iris-scan, or your address, or your (non-revoked) ...