搜索结果: 1-5 共查到“军队指挥学 Computational Assumptions”相关记录5条 . 查询时间(0.077 秒)
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
public key encryption receiver selective opening security chosen ciphertext security
2018/11/12
In the situation where there are one sender and multiple receivers, a receiver selective opening (RSO) attack for a public key encryption (PKE) scheme considers adversaries that can corrupt some of th...
Semantic Security Invariance under Variant Computational Assumptions
semantic security proof verification automation
2018/1/15
A game-based cryptographic proof is a relation that establishes equivalence between probabilistic sequences of actions by real and ideal world players. The author of a proof selects a hardness assumpt...
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
Non-Interactive Assumptions Computational Assumptions Target Assumptions
2017/4/24
Our analysis identifies two families of intractability assumptions, the qq-Generalized Diffie-Hellman Exponent assumptions and the qq-Simple Fractional assumptions that imply all other target assumpti...
Yao's millionaires' problem and public-key encryption without computational assumptions
Yao's millionaires' problem computationally unbounded adversary
2016/2/24
We offer efficient and practical solutions of Yao's millionaires' problem without using any one-way functions. Some of the solutions involve physical principles, while others are purely mathematical. ...
Matrix Computational Assumptions in Multilinear Groups
Matrix Problems Flexible Computational Problems Multilinear Maps
2015/12/31
We put forward a new family of computational assumptions, the Kernel Matrix DiffieHellman
Assumption. Given some matrix A sampled from some distribution D`,k, the kernel assumption
says that it is h...