搜索结果: 1-15 共查到“军事学 Forward-Secure”相关记录34条 . 查询时间(0.14 秒)
Towards Forward Secure Internet Traffic
cryptographic protocols applied cryptography key exchange
2019/7/17
Forward Secrecy (FS) is a security property in key-exchange algorithms which guarantees that a compromise in the secrecy of a long-term private-key does not compromise the secrecy of past session keys...
Multi-signatures allow a group of signers to jointly sign a message in a compact and efficiently verifiable signature, ideally independent of the number of signers in the group. We present the first p...
Forward Secure Signatures on Smart Cards
hash-based signatures forward secure signatures smart cards
2018/11/8
We introduce the forward secure signature scheme XMSS++ and present an implementation for smart cards. It is based on the hash-based signature scheme XMSS. In contrast to the only previous implementat...
Forward Secure Efficient Group Signature in Dynamic Setting using Lattices
Lattice based cryptography Dynamic group signature forward security
2017/11/28
Secret key exposure is at high risk in the computing infrastructure due to the increase in use of harmful devices. As a result, achieving forward secrecy is a preferable feature for any cryptosystem w...
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance
SSE cryptographic protocols
2017/11/21
Searchable Symmetric Encryption (SSE) has been widely applied in the design of encrypted database for exact queries or even range queries in practice. In spite of its efficiency and functionalities, i...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticated key exchange protocol from a two-move passively secure unauthenticated key agreement scheme (such...
On the Tightness of Forward-Secure Signature Reductions
Forward-security signatures lossy identification
2017/8/10
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shamir transform and show that they can admit tighter reductions to certain decisional complexity assumpt...
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
cryptographic protocols DSSE
2017/7/6
Forward privacy is a trending security notion of dynamic searchable symmetric encryption (DSSE). It guarantees the privacy of newly added data against the server who has knowledge of previous queries....
Sophos - Forward Secure Searchable Encryption
symmetric searchable encryption provable security implementation
2016/7/28
Searchable Symmetric Encryption aims at making possible searching over an encrypted database stored on an untrusted server while keeping privacy of both the queries and the data, by allowing some smal...
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes
Authenticated Key Exchange Protocol Forward Security Key Evolving Schemes
2016/1/25
This paper suggests a model and a definition for forward-secure authenticated key exchange
(AKE) protocols, which can be satisfied without depending on the Diffie-Hellman assumption.
The basic idea ...
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
Authenticated Data Structure secure authenticated data structure
2016/1/5
We present Balloon, a forward-secure append-only persistent
authenticated data structure. Balloon is designed for an initially trusted
author that generates events to be stored in a data structure (...
Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
Tor Onion routing Forward anonymity
2016/1/5
The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted
traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetri...
Tighter Reductions for Forward-Secure Signature Schemes
Forward-security signatures lossy identification
2016/1/3
In this paper, we revisit the security of factoring-based signature
schemes built via the Fiat-Shamir transform and show that they
can admit tighter reductions to certain decisional complexity assum...
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
Privacy Cloud Computing
2014/3/6
We present RASP, a new protocol for privacy-preserving range search and sort queries on encrypted data in the face of an untrusted data store. RASP has several advantages over existing work. First, RA...
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions
public-key cryptography / digital signature practical minimal security assumptions hash-based signatures forward security provable security
2012/3/26
We present the hash-based signature scheme \xmss. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a second preimage resi...