搜索结果: 1-6 共查到“军队指挥学 CCA secure encryption”相关记录6条 . 查询时间(0.054 秒)
Tightly Secure CCA-Secure Encryption without Pairings
public-key encryption CCA security tightness
2016/2/23
We present the first CCA-secure public-key encryption scheme based on DDH where the
security loss is independent of the number of challenge ciphertexts and the number of decryption queries.
Our cons...
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security
CCA-secure encryption multi-user multi-challenge
2016/1/7
To gain strong confidence in the security of a public-key scheme, it is most desirable for the
security proof to feature a tight reduction between the adversary and the algorithm solving the underlyi...
High Performance Lattice-based CCA-secure Encryption
Lattice-Based Cryptography Encryption Scheme Lattice-Based Assumptions
2016/1/4
Lattice-based encryption schemes still suffer from a low message throughput per ciphertext. This is mainly
due to the fact that the underlying schemes do not tap the full potentials of LWE. Many cons...
Compact CCA-Secure Encryption with Ciphertext Verifiability
Adaptive Chosen Ciphertext Secure (CCA), Provable Security, CCA with Ciphertext Indistinguishability
2011/7/25
While CCA secure encryption schemes that provide ciphertext indistinguishability offer strongest form of message secrecy, the integrity of the ciphertext is often overlooked.
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
CCA Secure Encryption Oblivious Third Parties
2011/7/25
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations.
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
cryptographic protocols / public-key encryption structure preserving oblivious party
2012/3/27
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not use hash-functions o...