搜索结果: 1-15 共查到“军队指挥学 Encryption Scheme”相关记录98条 . 查询时间(0.194 秒)
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Cloud Security Storage Protection Access Control, Policies
2019/6/12
Secure cloud storage is considered as one of the most important issues that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some int...
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15
NTRUReEncrypt NTRU Decryption Failure
2019/1/29
In ASIACCS 2015, Nuñez, Agudo, and Lopez proposed a proxy re-encryption scheme, NTRUReEncrypt, based on NTRU, which allows a proxy to translate ciphertext under the delegator's public key into a ...
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform
Post-Quantum Cryptography Lattice-based Encryption Scheme Java Card
2019/1/2
Memory-constrained devices, including widely used smart cards, require resisting attacks by the quantum computers. Lattice-based encryption scheme possesses high efficiency and reliability which could...
Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security
quantum cryptography quantum encryption delegated quantum computation
2018/12/20
Quantum homomorphic encryption (QHE) is an important cryptographic technology for delegated quantum computation. It enables remote Server performing quantum computation on encrypted quantum data, and ...
A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
Identity-Based Proxy Re-Encryption Collusion-resistance Random Oracle
2018/11/29
Cloud storage enables its users to store confidential information as encrypted files in the cloud. A cloud user (say Alice) can share her encrypted files with another user (say Bob) by availing proxy ...
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
Proxy Re-Encryption Random Oracle Model Chosen Ciphertext Security
2018/11/29
Proxy re-encryption (PRE) enables delegation of decryption rights by entrusting a proxy server with special information, that allows it to transform a ciphertext under one public key into a ciphertext...
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme
cryptographic protocols post-quantum cryptosystem
2018/11/2
We show how to build distributed key generation and distributed decryption procedures for the LIMA Ring-LWE based post-quantum cryptosystem. Our protocols implement the CCA variants of distributed dec...
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
E2EE LINE key exchange
2018/7/16
In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in Ea...
Efficient Fully Homomorphic Encryption Scheme
Fully homomorphic encryption data security lattices
2018/7/9
Since Gentry discovered in 2009 the first fully homomorphic encryption scheme, the last few years have witnessed dramatic progress on designing more efficient homomorphic encryption schemes, and some ...
Polynomial Functional Encryption Scheme with Linear Ciphertext Size
Functional Encryption Hybrid Scheme
2018/6/13
Our main idea is to generically combine two abstract encryption schemes that satisfies some special properties. We also gives an instantiation of our scheme by combining ElGamal scheme and Ring-LWE ba...
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme
Lattice-Based Cryptography Homomorphic Encryption Scale-Invariant Scheme
2018/6/13
Homomorphic encryption provides the ability to compute on encrypted data without ever decrypting them. Potential applications include aggregating sensitive encrypted data on a cloud environment and co...
On the security of Jhanwar-Barua Identity-Based Encryption Scheme
identity based encryption ibe
2018/5/28
In 2008, Jhanwar and Barua presented an improvement of the Boneh-Gentry-Hamburg (BGH) scheme. In addition to reducing the time complexity of the algorithm to find a solution of the equation ax2+Sy2≡1m...
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme
implementation lattice techniques public-key cryptography
2018/2/1
We present an optimized implementation of the Fan-Vercauteren variant of the scale-invariant homomorphic encryption scheme of Brakerski. Our algorithmic improvements focus on optimizing decryption and...
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks
Public Key Authenticated Encryption with Keyword Search Searchable Encryption Keyword Guessing Attack
2018/1/12
How to efficiently search over encrypted data is an important and interesting problem in the cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with keyword search (PE...
Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017
Public-Key Encryption Indeterminate Equations Cryptosystem Post-quantum cryptography
2017/12/25
Abstract. We investigate the security of a public-key encryption scheme, the Indeterminate Equation Cryptosystem (IEC), introduced by Akiyama, Goto, Okumura, Takagi, Nuida, and Hanaoka at SAC 2017 as ...