搜索结果: 1-15 共查到“军事学 secret-key”相关记录21条 . 查询时间(0.062 秒)
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Lattice cryptography Public-key encryption Noisy ElGamal
2019/4/22
Lattice-based public-key encryption has a large number of design choices that can be combined in diverse ways to obtain different tradeoffs. One of these choices is the distribution from which secret ...
Information-Theoretic Secret-Key Agreement: The Secret-Key Rate as a Function of the Channel Quality Ratio
Secret-Key Agreement Information-theoretic security Satellite model
2017/11/28
Information theoretically secure secret-key exchange between two parties, Alice and Bob, is a well-studied problem that is provably impossible without additional assumptions. However, it has shown to ...
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness
Secret-key functional encryption Collusion-resistance Succinctness
2017/7/4
We show how to construct secret-key functional encryption (SKFE) supporting unbounded polynomially many functional decryption keys, that is, collusion-resistant SKFE solely from SKFE supporting only o...
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption
Indistinguishability obfuscation Secret-key functional encryption Puncturable secret-key functional encryption
2017/4/27
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional encryption (SKFE). In the construction, SKFE need to be able to issue a-priori ...
Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption
Indistinguishability Obfuscation Functional Encryption
2017/3/27
We propose simple generic constructions of indistinguishability obfuscator (IO). Our key tool is exponentially-efficient indistinguishability obfuscator (XIO), which is the same as IO except that the ...
From Cryptomania to Obfustopia through Secret-Key Functional Encryption
Indistinguishability Obfuscation Functional Encryption
2016/6/6
Functional encryption lies at the frontiers of current research in cryptography; some variants have
been shown sufficiently powerful to yield indistinguishability obfuscation (IO) while other variant...
Extracting the RC4 secret key of the Open Smart Grid Protocol
Cryptography Security RC4 Smart Grid
2016/5/17
The Open Smart Grid Protocol (OSGP) is a widely used industry standard for exchanging sensitive data between devices inside of smart grids. For message confidentiality, OSGP implements a customised fo...
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
oblivious transfer elastic channels key agreement
2016/2/23
A (γ,δ)-elastic channel is a binary symmetric channel between a sender and a receiver where the error rate of an honest receiver is δ while the error rate of a dishonest receiver lies within the inter...
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing
secret key agreement single shot bound secure computing
2016/1/26
We consider secret key agreement by multiple parties observing
correlated data and communicating interactively over an insecure
communication channel. Our main contribution is a single-shot upper
b...
Towards Optimally Efficient Secret-Key Authentication from PRG
Authentication pseudorandom generators linear time
2016/1/9
We propose a new approach to the construction of secret-key authentication protocols making
black-box use of a pseudorandom generator (PRG). Our authentication protocols require only two
messages, h...
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
Approximate GCD problem (AGCD) cryptanalysis cryptography
2016/1/7
An encryption relation f伜Z亊Z with decryption function f−1 is {\it ``group-homomorphic''} if, for any suitable plaintexts x1 and x2, x1+x2=f−1(f(x1)+f(x2)). It is {\it ``ring-homomorphic''}...
Secret Key Cryptosystem based on Non-Systematic Polar Codes
Code based cryptography Polar codes Secret key cryptosystem
2014/3/6
Polar codes are a new class of error correcting linear block codes, whose generator matrix is specified by the knowledge of transmission channel parameters, code length and code dimension. Moreover, r...
Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel
Code based cryptography Polar codes
2014/3/11
This paper proposes an efficient secret key cryptosystem based on polar codes over Binary Erasure Channel. We introduce a method, for the first time to our knowledge, to hide the generator matrix of t...
Common Randomness and Secret Key Capacities of Two-way Channels
Two-way channel wiretap channel common randomness capacity secret key capacity
2011/3/11
Common Randomness Generation (CRG) and Secret Key Establishment (SKE) are fundamental
primitives that are used in information-theoretic coding and cryptography. We study these two
problems over the ...
Common Randomness and Secret Key Capacities of Two-way Channels
foundations / Two-way channel wiretap channel common randomness capacity secret key capacity
2012/3/29
Common Randomness Generation (CRG) and Secret Key Establishment (SKE) are fundamental primitives that are used in information-theoretic coding and cryptography. We study these two problems over the tw...