搜索结果: 1-6 共查到“军队指挥学 strong security”相关记录6条 . 查询时间(0.046 秒)
Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions
non-zero inner product encryptions adaptive security payload- hiding
2019/7/15
Non-zero inner product encryption (NIPE) allows a user to encrypt a message with its attribute vector and decryption is possible using a secret-key associated with a predicate vector if the inner prod...
In this paper, we first revisit the generic two-message key exchange (TMKE) scheme (which will be referred to as KF) introduced by Kurosawa and Furukawa (CT-RSA 2014). This protocol is mainly based on...
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
cryptographic protocols proof-of-concept implementation
2017/7/6
In the past few years secure messaging has become mainstream, with over a billion active users of end-to-end encryption protocols through apps such as WhatsApp, Signal, Facebook Messenger, Google Allo...
Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Applications
Tweakable Even-Mansour almost-XOR-universal hash functions HPH
2017/2/20
We present a generalized tweakable blockcipher HPH, which is constructed from a public random permutation PP and an almost-XOR-universal (AXU) hash function HH with a tweak and key schedule (t1,t2,K)∈...
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
One-round key exchange eCK security provable security
2016/1/5
One-round authenticated key exchange (ORKE) is an established research area, with many prominent protocol constructions like HMQV (Krawczyk, CRYPTO 2005) and Naxos (La Macchia et al., ProvSec 2007), a...
Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves
ramp secret sharing multiplicative secret sharing strong security
2015/12/29
We introduce a coding theoretic criterion for Yamamoto's strong security of the ramp secret sharing scheme. After that, by using it, we show the strong security of the strongly multiplicative ramp sec...