搜索结果: 1-10 共查到“军队指挥学 fixing”相关记录10条 . 查询时间(0.093 秒)
Breaking and Fixing Anonymous Credentials for the Cloud (Full Version)
Attribute-based credentials Privacy-preserving authentication Strong authentication
2019/9/23
In an attribute-based credential (ABC) system, users obtain a digital certificate on their personal attributes, and can later prove possession of such a certificate in an unlinkable way, thereby selec...
A Bit-fixing PRF with O(1) Collusion-Resistance from LWE
Constrained PRF Collusion-resistance LWE
2018/11/9
Constrained pseudorandom functions (CPRFs) allow learning modified PRF keys that can evaluate the PRF on a subset of the input space, or based on some sort of predicate. First introduced by Boneh and ...
Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance
Constrained PRF Collusion-resistance One-way functions
2018/11/5
Constrained pseudorandom functions (CPRFs) allow learning `constrained' PRF keys that can evaluate the PRF on a subset of the input space, or based on some sort of predicate. First introduced by Boneh...
Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs
Secure Approximation Protocol Secure Sketching Jaccard Similarity
2017/9/13
Computing similarity between data is a fundamental problem in information retrieval and data mining. To address the relevant performance and scalability challenges, approximation methods are employed ...
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
Direct Anonymous Attestation Anonymity Privacy Standards
2017/7/4
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used for the management of cryptographic keys and for remote attestation. The specification of the most r...
The HB protocol and its HB+HB+ successor are lightweight authentication schemes based on the Learning Parity with Noise (LPN) problem. They both suffer from the so-called GRS-attack whereby a man-in-t...
KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols
RFID cryptanalysis privacy
2016/12/8
Ownership Transfer Protocols for RFID allow transferring the rights over a tag from a current owner to a new owner in a secure and private way. Recently, Kapoor and Piramuthu have proposed two schemes...
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
Identity Based Cryptography Signcryption Cryptanalysis
2009/6/15
Signcryption is a cryptographic primitive that provides authentication and confidentiality
simultaneously in a single logical step. It is often required that multiple senders have to signcrypt a
sin...
In [17, 18] we presented a pairing based DAA protocol in the asymmetric setting, along
with a “security proof”. Jiangtao Li has pointed out to us an attack against this published protocol,
thus our ...
We report on a man-in-the-middle attack on PKINIT, the
public key extension of the widely deployed Kerberos 5 authentication
protocol. This flaw allows an attacker to impersonate Kerberos administra...