搜索结果: 1-15 共查到“军事学 Coding”相关记录33条 . 查询时间(0.107 秒)
Efficient coding for secure computing with additively-homomorphic encrypted data
packing batching homomorphic encryption
2019/5/5
A framework is introduced for efficiently computing with encrypted data. We assume a semi-honest security model with two computing parties. Two different coding techniques are used with additively hom...
A Traceable Ring Signature Scheme based on Coding Theory
cryptographic protocols digital signatures
2019/4/1
Traceable ring signatures are a variant of ring signatures which allows the identity of a user to be revealed, when it signs two different messages with respect to the same group of users. It has appl...
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Side-channel analysis belief propagation random probing model
2018/5/28
One important open question in the field of side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security...
Coding for interactive communication beyond threshold adversaries
Error correcting codes coding for interactive communication non malleable codes
2017/7/11
We revisit the setting of coding for interactive communication, CIC, (initiated by Schulman 96') for non-threshold tampering functions. In a nutshell, in the (special case of) the communication comple...
The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following the framework detailed by Lyubashevsky t...
Quantum key distribution with combined conjugate coding and information overloading
quantum key distribution conjugate coding
2016/5/9
Current quantum key distribution schemes depend either on a form of conjugate coding or on the principle of putting more information into a quantum state than can possibly be read out with a measureme...
In this work we apply information theoretically optimal arithmetic coding and a number of novel side-channel blinding countermeasure techniques to create BLZZRD, a practical, compact, and more quantum...
Coding Theoretic Construction of Quantum Ramp Secret Sharing
quantum cryptography secret sharing
2016/1/23
We show a construction of a quantum ramp secret sharing scheme from a nested pair of linear codes. Necessary and sufficient conditions for qualified sets and forbidden sets are given in terms of com...
We consider interactive proof systems over adversarial communication channels. We show
that the seminal result that IP = PSPACE still holds when the communication channel is
malicious, allowing even...
A Provably Secure Short Signature Scheme from Coding Theory
code-based signatures signatures with message recovery provable security
2015/12/22
Signatures with partially message recovery in which some parts of messages are not transmitted with signatures to make them shorter are useful where bandwidth is one of the crucial concern and especia...
CODING - Stream Cipher Methods by Varying Components during Ciphering Data
block ciphers pseudo-randomness stream ciphers
2014/3/6
Kernel of the symmetric block ciphering methods presented here is the coupling of XOR operations and of invertible substitution tables S with all possible 256**t byte groups (with t=1, 2, 3, ... bytes...
Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC.
Public Key Cryptosystem Error-Correcting Code
2014/3/7
In this paper, we present a new class of public key cryptosystems by modifying K(XII)SE(1)PKC[1], referred to as K(XIII)SE(1)PKC, and a particular class of K(XIII)SE(1)PKC, Kp(XIII)SE(1)PKC. We show t...
Secure Channel Coding Schemes based on Polar Codes
Joint encryption encoding scheme McEliece cryptosystem
2014/3/11
In this paper, we propose two new frameworks for joint encryption encoding schemes based on polar codes, namely efficient and secure joint secret/public key encryption channel coding schemes. The issu...
Non-Malleable Coding Against Bit-wise and Split-State Tampering
Tamper-Resilient Cryptography Coding Theory
2014/3/10
Non-malleable coding, introduced by Dziembowski, Pietrzak and Wichs (ICS 2010), aims for protecting the integrity of information against tampering attacks in situations where error-detection is imposs...
Interactive Coding, Revisited
interactive coding knowledge preserving simulation paradigm error correcting codes
2013/4/18
How can we encode a communication protocol between two parties to become resilient to adversarial errors on the communication channel? This question dates back to the seminal works of Shannon and Hamm...