搜索结果: 1-15 共查到“军队指挥学 Cryptography”相关记录323条 . 查询时间(0.125 秒)
Card-based Cryptography Meets Formal Verification
secure multiparty computation card-based cryptography formal verification
2019/9/17
Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation (MPC) with just a deck of cards. For the sake of simplicity, this is often done using ca...
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography
NIZK short proofs
2019/8/30
In their celebrated work, Groth and Sahai [EUROCRYPT'08, SICOMP' 12] constructed non-interactive zero-knowledge (NIZK) proofs for general bilinear group arithmetic relations, which spawned the entire ...
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Differential fault analysis white-box cryptography countermeasure
2019/8/26
Differential Fault Analysis (DFA) intentionally injects some fault into the encryption process and analyzes a secret key from the mathematical relationship between faulty and fault-free ciphertexts. E...
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
distributed homomorphic cryptosystems threshold cryptography secure multiparty computation
2019/8/26
In this work, we advance the conceptual and technical aspects of Secure Multiparty Computation (SMC). We approach SMC as a computational problem and propose a novel formulation of this problem in term...
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — A Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Pre- and Post-Quantum Cryptography Scalable One-Time Pad (S-OTP) Information Conservational Security (ICS)
2019/8/14
Whereas it is widely deemed impossible to overcome the optimality of the one-time pad (OTP) cipher in pre- and post-quantum cryptography, this work shows that the optimality of information theoretic s...
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Security protocols Authenticated key exchange Symmetric-key cryptography
2019/8/13
With the rise of the Internet of Things and the growing popularity of constrained end-devices, several security protocols are widely deployed or strongly promoted (e.g., Sigfox, LoRaWAN, NB-IoT). Base...
Accelerating V2X Cryptography through Batch Operations
Implicit certificates ECQV Batch ECDSA
2019/8/6
The increasing communication capabilities of vehicles are paving the way for promising road safety and traffic management applications. But the rise of connected vehicles also potentially introduces m...
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem
Multivariate Cryptography Noncommutative Cryptography stable transformation groups and semigroups
2019/8/6
Non-commutative cryptography studies cryptographic primitives and systems which are based on algebraic structures like groups, semigroups and noncommutative rings. We con-tinue to investigate inverse ...
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Undeniable quantum signature scheme Impersonation attack Quantum asymmetric cryptography
2019/7/15
In recent years, several cryptographic scholars have proposed quantum blind signature schemes. However, their methods require the signatories and the inspectors to share common keys in advance, which ...
RISC-V is a promising free and open-source instruction set architecture. Most of the instruction set has been standardized and several hardware implementations are commercially available. In this pape...
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockch...
Homomorphism learning problems and its applications to public-key cryptography
Learning With Errors isogenies non-commutative cryptography
2019/6/19
We present a framework for the study of a learning problem over abstract groups, and introduce a new technique which allows for public-key encryption using generic groups. We proved, however, that in ...
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?
Quantum Safe cryptography Post quantum cryptography IoT security
2019/6/12
The impending realization of scalable quantum computers has led to active research in Post Quantum Cryptography (PQC). The challenge is harder for embedded IoT (edge) devices, due to their pervasive d...
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Group actions isomorphism problems signature schemes
2019/6/12
Starting from the one-way group action framework of Brassard and Yung (Crypto '90), we revisit building cryptography based on group actions. Several previous candidates for one-way group actions no lo...
Public-Key Cryptography in the Fine-Grained Setting
Fine-grained Public-Key One-Way-Function
2019/6/4
Cryptography is largely based on unproven assumptions, which, while believable, might fail. Notably if P=NPP=NP, or if we live in Pessiland, then all current cryptographic assumptions will be broken. ...