搜索结果: 1-15 共查到“军事学 private-key”相关记录16条 . 查询时间(0.078 秒)
The Security of All Private-key Bits in Isogeny-based Schemes
supersingular isogeny Diffie--Hellman bit security hardcore bits
2019/3/1
We study the computational hardness of recovering single bits of the private key in the supersingular isogeny Diffie--Hellman (SIDH) key exchange and similar schemes. Our objective is to give a polyno...
Registration-Based Encryption: Removing Private-Key Generator from IBE
identity-based encryption key escrow
2018/11/8
In this work, we introduce the notion of registration-based encryption (RBE for short) with the goal of removing the trust parties need to place in the private-key generator in an IBE scheme. In an RB...
Signature Schemes with a Fuzzy Private Key
Fuzzy Signature Public Biometric Infrastructure
2017/12/13
In this paper, we introduce a new concept of digital signature that we call \emph{fuzzy signature}, which is a signature scheme that uses a noisy string such as biometric data as a private key, but \e...
From Minicrypt to Obfustopia via Private-Key Functional Encryption
Private-key functional encryption Public-key functional encryption PPAD hardness
2017/2/20
Private-key functional encryption enables fine-grained access to symmetrically-encrypted data. Although private-key functional encryption (supporting an unbounded number of keys and ciphertexts) seems...
Bitcoin smart contracts allow the development of new protocols on top of Bitcoin itself. This usually involves the definition of complex scripts, far beyond the requirement of a single signature. In t...
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key
cryptanalysis NTRU meet-in-the-middle attack
2016/2/24
NTRU is a public-key cryptosystem introduced at ANTS-III. The two most used techniques
in attacking the NTRU private key are meet-in-the-middle attacks and lattice-basis reduction
attacks. In the 20...
Function-Private Functional Encryption in the Private-Key Setting
Function-Private Functional Encryption Private-Key Setting
2016/1/8
Functional encryption supports restricted decryption keys that allow users to learn specific
functions of the encrypted messages. Although the vast majority of research on functional encryption
has ...
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
applied cryptography bitcoin key management
2016/1/6
In this paper we study the question of key management and
practical operational security in bitcoin digital currency storage systems.
We study the security two most used bitcoin HD Wallet key manage...
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
unctional encryption randomized functionalities punctured programming
2016/1/6
We present a construction of a private-key functional encryption scheme for any family of
randomized functionalities based on any such scheme for deterministic functionalities that is
sufficiently e...
We construct a general-purpose multi-input functional encryption scheme in the private-key
setting. Namely, we construct a scheme where a functional key corresponding to a function
f enables a user ...
Dynamic Runtime Methods to Enhance Private Key Blinding
exponent blinding side channel attacks
2014/3/11
In this paper we propose new methods to blind exponents used in RSA and in elliptic curves based algorithms. Due to classical differential power analysis (DPA and CPA), a lot of countermeasures to pro...
RSA private key reconstruction from random bits using SAT solvers
SAT solvers RSA partial key exposure factoring public-key cryptography
2013/2/21
SAT solvers are being used more and more in Cryptanalysis, with mixed results regarding their efficiency, depending on the structure of the algorithm they are applied. However, when it comes to intege...
Private-key Symbolic Encryption
Symbolic Encryption Hidden Assumptions Formal Security Model
2012/3/23
Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security analysis aiming at the automated verification of network protocols. The naive use of symbolic encryption, howeve...
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
Asynchronous Distributed Private-Key Generators Identity-Based Cryptography IBE scheme
2009/7/22
Identity-based cryptography can greatly reduce the complexity of sending encrypted messages over the Internet.
However, it necessarily requires a private-key generator (PKG), which can create private...
Forward-Security in Private-Key Cryptography
Symmetric cryptography forward security pseudorandom bit generators
2009/4/16
This paper provides a comprehensive treatment of forward-security in the context of shared-
key based cryptographic primitives, as a practical means to mitigate the damage caused by
key-exposure. We...