搜索结果: 1-9 共查到“军队指挥学 semantic”相关记录9条 . 查询时间(0.103 秒)
Semantic Security Invariance under Variant Computational Assumptions
semantic security proof verification automation
2018/1/15
A game-based cryptographic proof is a relation that establishes equivalence between probabilistic sequences of actions by real and ideal world players. The author of a proof selects a hardness assumpt...
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
Black-box separations circular security
2017/2/21
We address the problems of whether t-circular-secure encryption can be based on (t-1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based...
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
Errors Assumption Symmetric-Key Bit Encryption
2017/2/20
In this work we separate private-key semantic security from circular security using the Learning with Error assumption. Prior works used the less standard assumptions of multilinear maps or indistingu...
Improved, Black-Box, Non-Malleable Encryption from Semantic Security
public-key cryptography non-malleable encrytpion
2016/12/10
We give a new black-box transformation from any semantically secure encryption scheme into
a non-malleable one which has a better rate than the best previous work of Coretti et al. (TCC
2016-A). We ...
Semantic Security and Key-Privacy With Random Split of St-Gen Codes
Public Key Cryptography Code Based Cryptosystems Semantic Security
2016/3/1
Recently we have defined Staircase-Generator codes (St-Gen codes) and their variant
with a random split of the generator matrix of the codes. One unique property of these codes is
that they work wit...
Semantic Security and Indistinguishability in the Quantum World
quantum semantic indistinguishability
2015/12/31
At CRYPTO 2013, Boneh and Zhandry initiated the study of
quantum-secure encryption. They proposed first indistinguishability definitions
for the quantum world where the actual indistinguishability o...
Semantic Security Under Related-Key Attacks and Applications
related-key attacks randomized encryption oblivious transfer operation respecting synthesizers correlation-robust hash functions
2010/10/26
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking the primitive with several secret keys which satisfy some known, or even chosen, relation. We initiat...
Relation among simulator-based and comparison-based definitions of semantic security
simulator-based and comparison-based definitions semantic security
2009/4/8
Relation among simulator-based and comparison-based definitions of semantic security.
AN EFFICIENT VARIANT OF RSA CRYPTOSYSTEM WITH SEMANTIC SECURITY
Public key cryptosystem RSA CRT semantically secure
2009/3/13
An efficient variant of RSA cryptosystem was proposed by Cesar
[2]. He called it Rprime RSA. The Rprime RSA is a combination of Mprime
RSA [3] and Rebalanced RSA [9, 1]. Although the decryption spee...