搜索结果: 1-15 共查到“军事学 Public Key Encryption”相关记录131条 . 查询时间(0.093 秒)
Simple and Efficient KDM-CCA Secure Public Key Encryption
key dependent message security chosen ciphertext security
2019/9/16
We propose two efficient public key encryption (PKE) schemes satisfying key dependent message security against chosen ciphertext attacks (KDM-CCA security). The first one is KDM-CCA secure with respec...
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
public-key cryptography Rand-RCCA PKE
2019/8/22
Re-randomizable RCCA-secure public key encryption (Rand-RCCA PKE) schemes reconcile the property of re-randomizability of the ciphertexts with the need of security against chosen-ciphertexts attacks.
Non-malleability for quantum public-key encryption
public-key cryptography non-malleability quantum cryptography
2019/5/21
Non-malleability is an important security property for public-key encryption (PKE). Its significance is due to the fundamental unachievability of integrity and authenticity guarantees in this setting,...
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Lattice cryptography Public-key encryption Noisy ElGamal
2019/4/22
Lattice-based public-key encryption has a large number of design choices that can be combined in diverse ways to obtain different tradeoffs. One of these choices is the distribution from which secret ...
Everybody's a Target: Scalability in Public-Key Encryption
public-key cryptography key encapsulation, mass surveillance elliptic-curve cryptography (ECC)
2019/4/10
For 1≤m≤n1≤m≤n, we consider a natural mm-out-of-nn multi-instance scenario for a public-key encryption (PKE) scheme. An adversary, given nn independent instances of PKE, wins if he breaks at least mm ...
Password-Authenticated Public-Key Encryption
Password Authenticated Key Exchange Universal Composability Public Key Encryption
2019/3/1
We introduce password-authenticated public-key encryption (PAPKE), a new cryptographic primitive. PAPKE enables secure end-to-end encryption between two entities without relying on a trusted third par...
A Framework for Achieving KDM-CCA Secure Public-Key Encryption
key dependent message security chosen ciphertext security projective hash function
2018/11/16
We propose a framework for achieving a public-key encryption (PKE) scheme that satisfies key dependent message security against chosen ciphertext attacks (KDM-CCA security) based on projective hash fu...
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks
After-the-Fact Post-challenge Entropic PKE
2018/11/13
In this paper, we introduce a new framework for constructing public-key encryption (PKE) schemes resilient to joint post-challenge/after-the-fact leakage and tampering attacks in the bounded leakage a...
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
lattice based cryptography learning with errors error correction
2018/11/2
Lattice based cryptography is one of the leading candidates of the post quantum cryptography. A major obstacle of deployment, though, is that its payload is relatively larger than the classical soluti...
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Lattice cryptography Post-quantum cryptography Learning with rounding
2018/8/10
Standardization bodies such as NIST and ETSI are currently seeking quantum resistant alternatives to vulnerable RSA and elliptic curve-based public-key algorithms. In this context, we present Round5, ...
Limits on the Power of Garbling Techniques for Public-Key Encryption
Public-key encryption one-way function black-box constructions non-black-box separations
2018/6/5
Understanding whether public-key encryption can be based on one-way functions is a fundamental open problem in cryptography. The seminal work of Impagliazzo and Rudich [STOC'89] shows that black-box c...
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Sanitizable signatures Invisibility Public-key encryption
2018/4/12
Sanitizable signature schemes are signature schemes which support the delegation of modification rights. The signer can allow a sanitizer to perform a set of admissible operations on the original mess...
Improved fully homomorphic public-key encryption with small ciphertext size
fully homomorphic public-key encryption multivariate algebraic equation
2018/3/5
A cryptosystem which supports both addition and multiplication (thereby preserving the ring structure of the plaintexts) is known as fully homomorphic encryption (FHE) and is very powerful. Using such...
Fully homomorphic public-key encryption with small ciphertext size
fully homomorphic public-key encryption multivariate algebraic equation non-associative ring
2018/1/29
In previous work I proposed a fully homomorphic encryption without bootstrapping which has the large size of ciphertext. This tme I propose the fully homomorphic public-key encryption scheme on non-as...
In this paper, we consider a scenario where a sender transmits ciphertexts to multiple receivers using a public-key encryption scheme, and at a later point of time, wants to retrieve the plaintexts, w...