搜索结果: 1-6 共查到“军队指挥学 KDM Security”相关记录6条 . 查询时间(0.116 秒)
CPA-to-CCA Transformation for KDM Security
public-key encryption key-dependent message security chosen ciphertext security
2019/6/3
We show that chosen plaintext attacks (CPA) security is equivalent to chosen ciphertext attacks (CCA) security for key-dependent message (KDM) security. Concretely, we show how to construct a public-k...
In this note, we show that a strong notion of KDM security cannot be obtained by any encryption scheme in the auxiliary input setting, assuming Learning With Errors (LWE) and one-way permutations. The...
KDM Security for Identity-Based Encryption: Constructions and Separations
KDM security IBE IB-HPS
2016/12/8
For encryption schemes, key dependent message (KDM) security requires that ciphertexts preserve secrecy even when the encrypt messages may depend on the secret keys. While KDM security has been extens...
Bounded KDM Security from iO and OWF
obfuscation KDM security key dependent message security
2016/7/13
To date, all constructions in the standard model (i.e., without random oracles) of Bounded Key-Dependent Message (KDM) secure (or even just circularly-secure) encryption schemes rely on specific assum...
KDM-Security via Homomorphic Smooth Projective Hashing
public-key cryptography Homomorphic Smooth Projective Hashing
2015/12/24
We present new frameworks for constructing public-key encryption schemes satisfying key-dependent
message (KDM) security and that yield efficient, universally composable oblivious transfer (OT) proto...
We study the natural question of how well suited the hybrid encryption paradigm is in the context of key-dependent message (KDM) attacks. We prove that if a key derivation function (KDF) is used in be...