搜索结果: 1-5 共查到“军队指挥学 bounded retrieval model”相关记录5条 . 查询时间(0.127 秒)
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Leakage-resilience Bounded retrieval model Identity-based Encryption
2019/1/26
We propose new constructions of leakage-resilient public-key encryption (PKE) and identity-based encryption (IBE) schemes in the bounded retrieval model (BRM). In the BRM, adversaries are allowed to o...
A practical, perfectly secure password scheme in the bounded retrieval model
secret-key cryptography bounded retrieval model
2017/9/25
In this paper, we present a practical password scheme due to Spilman, which is perfectly secure in the bounded retrieval model, assuming ideal hash functions. The construction is based on a hash-like ...
Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model
bounded retrieval model non-malleable codes locally decodable codes
2017/4/11
In a recent result, Dachman-Soled et al.(TCC '15) proposed a new notion called locally decodable and updatable non-malleable codes, which informally, provides the security guarantees of a non-malleabl...
Public-Key Encryption in the Bounded-Retrieval Model
Public-Key Encryption Bounded-Retrieval Model
2009/11/18
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security
against various forms of adversarial “key leakage” attacks. In this model, the adversary i...
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Leakage-Resilient Public-Key Cryptography Bounded-Retrieval Model
2009/6/12
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker
can repeatedly and adaptively learn information about the secret key, subject only to the
constrai...