搜索结果: 1-2 共查到“军队指挥学 Post-challenge”相关记录2条 . 查询时间(0.046 秒)
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks
After-the-Fact Post-challenge Entropic PKE
2018/11/13
In this paper, we introduce a new framework for constructing public-key encryption (PKE) schemes resilient to joint post-challenge/after-the-fact leakage and tampering attacks in the bounded leakage a...
Encryption Schemes with Post-Challenge Auxiliary Inputs
leakage-resilient auxiliary inputs
2014/3/12
In this paper, we tackle the open problem of proposing a leakage-resilience encryption model that can capture leakage from both the secret key owner and the encryptor, in the auxiliary input model. Ex...