搜索结果: 1-15 共查到“军事学 server”相关记录53条 . 查询时间(0.026 秒)
A Server-Assisted Hash-Based Signature Scheme
digital signatures hash functions public-key cryptography
2019/6/10
We present a practical digital signature scheme built from a cryptographic hash function and a hash-then-publish digital time- stamping scheme. We also provide a simple proof of existential unforgeabi...
How to Correct Errors in Multi-Server PIR
Private Information Retrieval information theoretic error correcting
2019/5/22
Suppose that there exist a user and ℓ servers S1,…,Sℓ. Each server Sj holds a copy of a database x=(x1,…,xn)∈{0,1}n, and the user holds a secret index i0∈{1,…,n}. A b error correcting T...
On Quantum Advantage in Information Theoretic Single-Server PIR
quantum complexity private information retrieval specious security
2019/3/4
In (single-server) Private Information Retrieval (PIR), a server holds a large database DBDB of size nn, and a client holds an index i∈[n]i∈[n] and wishes to retrieve DB[i]DB[i] without revealing ii t...
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
oblivious RAM muli-server perfect security
2018/11/15
The problem of Oblivious RAM (ORAM) has traditionally been studied in the single-server setting, but more recently the multi-server setting has also been considered. Yet it is still unclear whether th...
Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation
modular exponentiations secure outsourcing
2018/11/2
We investigate the problem of securely outsourcing modular exponentiations to a single, malicious computational resource. We revisit recently proposed schemes using single server and analyse them agai...
We show a protocol for two-server oblivious RAM (ORAM) that is simpler and more efficient than the best prior work. Our construction combines any tree-based ORAM with an extension of a two-server priv...
Anonymous Single-Round Server-Aided Verification
Server-Aided Verification Digital Signatures Anonymity
2017/8/28
Server-Aided Verification (SAV) is a method that can be employed to speed up the process of verifying signatures by letting the verifier outsource part of its computation load to a third party. Achiev...
Separating Computational and Statistical Differential Privacy in the Client-Server Model
differential privacy computational differential privacy witness indistinguishability
2016/12/10
Differential privacy is a mathematical definition of privacy for statistical data analysis. It
guarantees that any (possibly adversarial) data analyst is unable to learn too much information
that is...
Server-Aided Revocable Identity-Based Encryption from Lattices
lattice techniques public-key cryptography
2016/12/8
Server-aided revocable identity-based encryption (SR-IBE), recently proposed by Qin et al.
at ESORICS 2015, offers significant advantages over previous user revocation mechanisms in the scope
of IBE...
Universally Composable Two-Server PAKE
PAKE Universal Composability Smooth Projective Hashing
2016/5/30
Two-Server Password Authenticated Key Exchange (2PAKE) protocols apply secret sharing
techniques to achieve protection against server-compromise attacks. 2PAKE protocols eliminate
the need for passw...
New Framework for Secure Server-Designation Public Key Encryption with Keyword Search
Computer Networks Information Security Distributed Systems
2016/4/6
Recently, a new framework, called secure server-designation public key encryption
with keyword search (SPEKS), was introduced to improve the security of dPEKS
(which suffers from the on-line keyword...
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
Secure outsource computation Cryptanalysis Coppersmith methods
2016/3/21
We address the problem of speeding up group computations in cryptography using a single untrusted computational resource. We analyze the security of an efficient protocol for securely outsourcing mult...
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Web PKI SSL/TLS man-in-the-middle attack
2016/2/23
. SSL/TLS is the de facto protocol for providing secure communication
over the Internet. It relies on the Web PKI model for authentication
and secure key exchange. Despite its relatively successful ...
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Key agreement scheme Anonymous multi-server Securty
2016/1/26
Chuang and Chen propose an anonymous multi server authenticated
key agreement scheme based on trust computing using smart
card, password, and biometrics. Chuang and Chen say that this scheme
not on...
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE
Smooth Projective Hash Functions Two-Server PAKE
2016/1/9
Smooth projective hash functions have been used as building block for various cryptographic
applications, in particular for password-based authentication.