搜索结果: 1-9 共查到“军事学 subversion”相关记录9条 . 查询时间(0.125 秒)
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Commitment schemes subversion security common reference string model
2019/9/23
A commitment scheme allows a committer to create a commitment to a secret value, and later may open and reveal the secret value in a verifiable manner. In the common reference string model, commitment...
Subversion in Practice: How to Efficiently Undermine Signatures
cryptanalysis digital signatures implementation
2018/12/19
Algorithm substitution attack (ASA) on signatures should be treated seriously as the authentication services of numerous systems and applications rely on signature schemes and compromising them has a ...
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups
Public-key encryption subversion mass surveillance
2018/1/11
We initiate the study of public-key encryption (PKE) schemes and key-encapsulation mechanisms (KEMs) that retain security even when public parameters (primes, curves) they use may be untrusted and sub...
At Asiacrypt 2016 Bellare, Fuchsbauer and Scafuro introduced the notion of subversion zero knowledge for non-interactive proof systems, demanding that zero knowledge (ZK) is maintained even when the c...
A Subversion-Resistant SNARK
Common reference string generic group model non-interactive zero knowledge
2017/6/22
While succinct non-interactive zero-knowledge arguments of knowledge (zk-SNARKs) are widely studied, the question of what happens when the CRS has been subverted has received little attention. In ASIA...
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
signatures subversion mass surveillance
2016/12/8
This paper presents highly efficient designs of double authentication preventing signatures (DAPS). In a DAPS, signing two messages with the same first part and differing second parts reveals the sign...
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
Parameter Subversion CRS
2016/4/15
Motivated by the subversion of ``trusted'' public parameters in mass-surveillance activities, this paper studies the security of NIZKs in the presence of a maliciously chosen common reference string. ...
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
Hedged encryption randomness subversion
2016/1/6
This paper provides the first efficient, standard-model, fully-secure schemes for some related and
challenging forms of public-key encryption (PKE), namely deterministic and hedged PKE. These forms
...
Subversion-Resilient Signatures: Definitions, Constructions and Applications
Signature Schemes Subversion Attacks Tampering
2015/12/30
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is inspired by the prolif...