搜索结果: 1-15 共查到“军事学 Secure Public-Key Encryption”相关记录22条 . 查询时间(0.216 秒)
Simple and Efficient KDM-CCA Secure Public Key Encryption
key dependent message security chosen ciphertext security
2019/9/16
We propose two efficient public key encryption (PKE) schemes satisfying key dependent message security against chosen ciphertext attacks (KDM-CCA security). The first one is KDM-CCA secure with respec...
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
public-key cryptography Rand-RCCA PKE
2019/8/22
Re-randomizable RCCA-secure public key encryption (Rand-RCCA PKE) schemes reconcile the property of re-randomizability of the ciphertexts with the need of security against chosen-ciphertexts attacks.
A Framework for Achieving KDM-CCA Secure Public-Key Encryption
key dependent message security chosen ciphertext security projective hash function
2018/11/16
We propose a framework for achieving a public-key encryption (PKE) scheme that satisfies key dependent message security against chosen ciphertext attacks (KDM-CCA security) based on projective hash fu...
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
selective opening public-key cryptography SIM-SO-CCA
2018/1/11
Selective opening security (SO security) is desirable for public key encryption (PKE) in a multi-user setting. {In a selective opening attack, an adversary receives a number of ciphertexts for possibl...
KDM-Secure Public-Key Encryption from Constant-Noise LPN
learning parity with noise key-dependent message security public-key encryption
2017/4/12
The Learning Parity with Noise (LPN) problem has found many applications in cryptography due to its conjectured post-quantum hardness and simple algebraic structure. Over the years, constructions of d...
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
public-key encryption key-dependent messages chosen-ciphertext security
2016/12/10
KDM[F][F]-CCA secure public-key encryption (PKE) protects the security of message f(sk)f(sk), with f∈Ff∈F, that is computed directly from the secret key, even if the adversary has access to a decrypti...
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption
Public Key Encryption randomized algorithms
2016/6/2
We describe a general technique to protect randomized algorithms against kleptographic attacks. We then apply the technique to construct the first IND-CPA secure public-key encryp- tion scheme in the ...
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Department of Computer Engineering,University of Peradeniya
2016/1/26
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simpl...
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
Identity-based encryption Bounded-CCA security
2016/1/26
Identity-based encryption (IBE) is a special case of public-key encryption where
user identities replace public keys. Every user is given a corresponding secret key for decryption,
and encryptions f...
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
Low Noise LPN Key Dependent Message Security LPN Hardness Reduction
2016/1/5
Cryptographic schemes based on the Learning Parity with Noise (LPN) problem have several
very desirable aspects: Low computational overhead, simple implementation and conjectured
post-quantum hardne...
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
Public-key encryption leakage flexibility chosen-ciphertext security
2016/1/3
In AsiaCrypt~2013, Qin and Liu proposed a new approach to CCA-security of Public-Key Encryption (PKE) in the presence of bounded key-leakage, from any universal hash proof system (due to Cramer and Sh...
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
Public-key encryption leakage-resilience
2014/3/7
We present a new generic construction of a public-key encryption (PKE) scheme secure against leakage-resilient chosen-ciphertext attacks (LR-CCA), from any Hash Proof System (HPS) and any one-time los...
A Brief History of Provably-Secure Public-Key Encryption
Brief History Provably-Secure Public-Key Encryption
2009/6/12
Public-key encryption schemes are a useful and interesting
field of cryptographic study. The ultimate goal for the cryptographer in
the field of public-key encryption would be the production of a ve...
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
CCA2 Secure Public Key Encryption Scheme McEliece Assumptions Standard Model
2009/6/9
We show that a recently proposed construction by Rosen and Segev can be
used for obtaining the first public key encryption scheme based on the McEliece
assumptions which is secure against adaptive c...
Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext
public key encryption IND-CCA2 DDH
2009/6/5
An efficient variant of the ElGamal public key encryption scheme is proposed which is
provably secure against adaptive chosen ciphertext attacks(IND-CCA2) under the decisional Diffie-
Hellman(DDH) a...