搜索结果: 1-15 共查到“军队指挥学 Transformation”相关记录27条 . 查询时间(0.155 秒)
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces
Multivariate Cryptography stable transformation groups and semigroups decomposition problem of nonlinear multivariate map into given generators
2019/6/3
Noncommutative cryptography is based on applications of algebraic structures like noncommutative groups, semigroups and non-commutative rings. Its inter-section with Multivariate cryptography contains...
CPA-to-CCA Transformation for KDM Security
public-key encryption key-dependent message security chosen ciphertext security
2019/6/3
We show that chosen plaintext attacks (CPA) security is equivalent to chosen ciphertext attacks (CCA) security for key-dependent message (KDM) security. Concretely, we show how to construct a public-k...
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Fiat-Shamir post-quantum digital signatures
2019/3/1
The famous Fiat-Shamir transformation turns any public-coin three-round interactive proof, i.e., any so-called sigma-protocol, into a non-interactive proof in the random-oracle model. We study this tr...
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge
statistical zero-knowledge honest-verifier statistical zero-knowledge instance-dependent commitment schemes
2018/3/6
We present an unconditional transformation from any honest-verifier statistical zero-knowledge (HVSZK) protocol to standard SZK that preserves round complexity and efficiency of both the verifier and ...
A Modular Analysis of the Fujisaki-Okamoto Transformation
public-key encryption Fujisaki-Okamoto transformation tight reductions
2017/6/26
The Fujisaki-Okamoto (FO) transformation (CRYPTO 1999 and Journal of Cryptology 2013) turns any weakly secure public-key encryption scheme into a strongly (i.e., IND-CCA) secure one in the random orac...
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Department of Computer Engineering,University of Peradeniya
2016/1/26
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simpl...
An Equivalence-Preserving Transformation of Shift Registers
Feedback shift register NLFSR Fibonacci configuration
2016/1/26
The Fibonacci-to-Galois transformation is useful for reducing the propagation
delay of feedback shift register-based stream ciphers and hash functions.
In this paper, we extend it to handle Galois-t...
A Second Look at Fischlin's Transformation
Fischlin抯 transformation leakage tightness random oracle
2016/1/25
Fischlin抯 transformation is an alternative to the standard Fiat-Shamir transform to
turn a certain class of public key identification schemes into digital signatures (in the random
oracle model).
A Tight Transformation between HILL and Metric Conditional Pseudoentropy
Pseudoentropy Dense Model Theorem Convex Approximation
2016/1/6
The notion of HILL Entropy appeared in the breakthrough construction of a PRG from any one-way function (H錽tad et al.), and has become the most important and most widely used variant of computational ...
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers
matrices over real numbers affine transformations
2015/12/31
This paper studies the possibility of achieving indistinguishabilitybased
security in privately outsourcing linear equation systems over real numbers.
The particular task is to solve a full-rank n ×...
On Limitations of the Fiat瓥Shamir Transformation
zero-knowledge sigma protocol adaptive security
2015/12/24
It has long been known (Shoup and Gennaro 1998 [1]) that non-interactive proofs in the
Random Oracle model that rely on rewinding extractors can be problematic. Recent results by
Seurin and Treger [...
The Fiat-Shamir transformation is a famous technique to turn identification schemes into signature schemes. The derived scheme is provably secure in the random-oracle model against classical adversari...
New Attacks against Transformation-Based Privacy-Preserving Linear Programming
cryptanalysis linear programming
2014/3/12
In this paper we demonstrate a number of attacks against proposed protocols for privacy-preserving linear programming, based on publishing and solving a transformed version of the problem instance. Ou...
A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation
public-key cryptography
2012/6/14
In this paper, a new class of Public-Key Cryptosystem(PKC) based on Random Simultaneous Equation of degree g(RSE(g)PKC) is presented. The proposed scheme uses a new class of trap-doors based on two cl...
A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation
public-key cryptography
2012/3/20
In this paper, a new class of Public-Key Cryptosystem(PKC) based on Random Simultaneous Equation of degree g(RSE(g)PKC) is presented. The proposed scheme uses a new class of trap-doors based on two cl...