搜索结果: 1-15 共查到“密码学 Provable”相关记录59条 . 查询时间(0.062 秒)
In this work we apply the systematic approach of game-based security specifications and proofs by reductions, to the design and evaluation of public key infrastructure (PKI) schemes. The importance of...
Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures
Provable Security Multi-Signatures
2018/5/11
A multisignature scheme allows a group of signers to collaboratively sign a message, creating a single signature that convinces a verifier that every individual signer approved the message. The increa...
Efficient provable-secure NTRUEncrypt over any cyclotomic field
NTRU Ideal lattice Canonical embedding
2017/11/20
NTRUEncrypt is a fast lattice-based cryptosystem and a probable alternative of the existing public key schemes. The existing provable-secure NTRUEncrypts are limited by the cyclotomic field it works o...
Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet
cryptographic protocols messaging implementation position
2017/10/10
Secure messaging apps have enjoyed huge uptake, and with the headline figure of one billion active WhatsApp users there has been a corresponding burst of academic research on the topic. One might ther...
New Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks
multilinear maps obfuscation CLT13
2017/9/28
We devise the first weak multilinear map model for CLT13 multilinear maps (Coron et al., CRYPTO 2013) that captures all known classical polynomial-time attacks on the maps. We then show important appl...
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
Authenticated Encryption Public Verifiability Cloud Computing
2017/7/24
In this work the first linearly homomorphic authenticated encryption scheme with public verifiability and provable correctness, called LEPCoV, is presented. It improves the initial proposal by avoidin...
Many modern block ciphers are constructed based on the paradigm of substitution-permutation networks (SPNs). But, somewhat surprisingly---especially in comparison with Feistel networks, which have bee...
On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks
Tweakable Even-Mansour almost-XOR-universal hash functions multi-key attack
2016/12/29
Cogliati et al. introduced the tweakable Even-Mansour cipher constructed from a single permutation and an almost-XOR-universal (AXU) family of hash functions with tweak and key schedule. Most of previ...
A Generic Dynamic Provable Data Possession Framework
Secure Data Outsourcing Dynamic Provable Data Possession (DPDP), Authenticated Data Structures
2016/12/12
Ateniese et al. introduced the Provable Data Possession (PDP) model in 2007. Following that, Erway et al. adapted the model for dynamically updatable data, and called it the Dynamic Provable Data Poss...
Recent results show that the current implementation of Helios, a practical e-voting protocol, does not ensure independence of the cast votes, and demonstrate the impact of this lack of independence on...
Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle
Broadcast encryption Hierarchical identity-based encryption Identity-based multi designated verifier signature
2016/12/10
Hierarchical identity-based broadcast encryption (HIBBE) organizes the users in a tree-like structure in which they can delegate the decryption ability to their subordinates. In addition, the trusted ...
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version)
ARX block ciphers differential cryptanalysis
2016/12/8
We present, for the first time, a general strategy for designing ARX symmetric-key primitives with provable resistance against single-trail differential and linear cryptanalysis. The latter has been a...
In recent years there have been several attempts to build white-box block ciphers whose implementation aims to be incompressible. This includes the weak white-box ASASA construction by Bouillaguet, Bi...
Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach
Lattice-based cryptography post-quantum cryptography authenticated encryption
2016/3/11
Lattice-based cryptography has been received significant attention in the past decade. It has attractive properties such as
being a major post-quantum cryptography candidate, enjoying worst-case to a...
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
Bent Function;Galois ring, Non Linearity
2016/2/23
Bent functions shows some vital properties among all combinatorial objects. Its links in combinatorics, cryptography and coding theory attract the scientific community to construct new class of bent f...