搜索结果: 1-15 共查到“军事学 CCA2”相关记录22条 . 查询时间(0.045 秒)
Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security
LWE standard model Naor-Yung
2019/8/8
The Naor-Yung paradigm is a well-known technique that constructs IND-CCA2-secure encryption schemes by means of non-interactive zero-knowledge proofs satisfying a notion of simulation-soundness. Until...
Improved Lattice-based CCA2-Secure PKE in the Standard Model
public-key encryption learning with errors chosen ciphertext security
2019/2/25
Based on the identity-based encryption (IBE) from lattices by Agrawal et al. (Eurocrypt'10), Micciancio and Peikert (Eurocrypt'12) presented a CCA1-secure public-key encryption (PKE), which has the be...
QC-MDPC: A Timing Attack and a CCA2 KEM
post-quantum cryptography code-based cryptography QC-MDPC codes
2018/3/12
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This proposal uses an iterative bi...
Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes
public-key cryptography code based public key encryption
2017/3/2
Recently, Wang (2016) introduced a random linear code based quantum resistant public encryption scheme RLCE which is a variant of McEliece encryption scheme. In this paper, we introduce a revised vers...
Practical CCA2-Secure and Masked Ring-LWE Implementation
CCA2-security lattice-based cryptography post-qunatum
2016/12/7
In this work we provide the first practical instantiation of ring-LWE-based public-key encryption that is protected against active attacks (i.e., adaptive chosen-ciphertext attacks) and equipped with ...
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Hierarchical Identity-Based Broadcast Encryption Adaptive Security Chosen-ciphertext Security
2016/6/22
With the advances of cloud computing, data sharing becomes easier for large-scale enterprises. When deploying privacy and security schemes in data sharing systems, fuzzy-entity data sharing, entity ma...
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption
additive homomorphic encryption adaptive chosen ciphertext attack malleability
2016/1/27
It is a well-known result that homomorphic encryption is not secure against adaptive chosen
ciphertext attacks (CCA2) because of its malleability property. Very recently, however, Gong et al. propose...
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Department of Computer Engineering,University of Peradeniya
2016/1/26
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simpl...
A note on CCA2-protected McEliece Cryptosystem with a systematic public key
cryptanalysis public-key cryptography McEliece cryptosystem
2016/1/7
We show that the plaintext of some of the proposed CCA2 conversions of McEliece cryptosystem
with a public key in systematic form can be recovered faster than with a general linear
decoding. This is...
Sponge based CCA2 secure asymmetric encryption for arbitrary length message
OAEP Sponge function public key encryption
2015/12/31
OAEP and other similar schemes proven secure in Random-Oracle Model require one or
more hash functions with output size larger than those of standard hash functions. In this
paper, we show that by u...
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
Attribute-based encryption Attribute-based signature Attribute-based signcryption
2015/12/29
An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption
(ABE) and Attribute-Based Signature (ABS), where we have the message confidentiality and authenticity
toge...
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
simulation-soundness chosen-ciphertext security
2014/3/6
Verifiability is central to building protocols and systems with integrity. Initially, efficient methods employed the Fiat-Shamir heuristics. Since 2008, the Groth-Sahai techniques have been the most e...
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme
plaintext aware encryption weakly simulatable public key encryption
2014/3/6
We present a construction of a CCA2-secure encryption scheme from a plaintext aware, weakly simulatable public key encryption scheme. The notion of plaintext aware, weakly simulatable public key encry...
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme
Post-quantum cryptography Lattice-based PKE scheme Universal random data padding CCA2-security
2013/4/18
Design efficient Lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed Lattice-based PKE scheme...
An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model
Post-quantum cryptography McEliece cryptosystem IND-CCA2
2013/2/21
Recently, a few CCA2-secure (IND-CCA2) variant of the McEliece cryptosystem in the standard model were introduced. All these schemes are based on Rosrn-Segev approach and lossy trapdoor function and u...