搜索结果: 1-11 共查到“军队指挥学 witness encryption”相关记录11条 . 查询时间(0.062 秒)
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Witness Encryption Trace and Revoke Broadcast Encryption
2019/1/18
An emerging trend is for researchers to identify cryptography primitives for which feasibility was first established under obfuscation and then move the realization to a different setting. In this wor...
Constructing Witness PRF and Offline Witness Encryption Without Multilinear Maps
Witness PRF Offline Witness Encryption Randomized Encoding
2018/6/13
Witness pseudorandom functions (witness PRFs), introduced by Zhandry [Zha16], was defined for an NP language L and generate a pseudorandom value for any instance x. The same pseudorandom value can be ...
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
witness encryption non-trivial efficiency null-iO
2017/9/14
A witness encryption (WE) scheme can take any NP statement as a public-key and use it to encrypt a message. If the statement is true then it is possible to decrypt the message given a corresponding wi...
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security
Indistinguishability Obfuscation Witness Encryption Combiners
2016/3/14
Over the last few years a new breed of cryptographic primitives has arisen: on one hand they have previously unimagined utility and on the other hand they are not based on simple to state and tried ou...
Witness Encryption from Instance Independent Assumptions
Witness Encryption Instance Independent Assumptions
2016/1/23
Witness encryption was proposed by Garg, Gentry, Sahai, and Waters as a means to encrypt to an instance, x, of an NP language and produce a ciphertext. In such a system, any decryptor that knows of ...
Time-release Protocol from Bitcoin and Witness Encryption for SAT
time-release crypto bitcoin mining proof-of-work
2015/12/30
We propose a new time-release protocol based on the bitcoin protocol and witness encryption. We derive a ``public key'' from the bitcoin block chain for encryption. The decryption key are the unpredic...
Witness encryption (WE) was introduced by Garg et al. (STOC’13). A WE scheme is defined
for some NP language L and lets a sender encrypt messages relative to instances x. A ciphertext for x can
be d...
Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower
Witness encryption smooth projective hash functions ring signatures
2015/12/21
Witness encryption (WE) is a recent powerful encryption paradigm. It greatly
extends the scope of encryption as it allows to encrypt a message using the description
of a hard problem (a word in some...
We put forth the concept of \emph{witness encryption}. A witness encryption scheme is defined for an NP language $L$ (with corresponding witness relation $R$). In such a scheme, a user can encrypt a m...
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
Differing-Inputs Obfuscation Extractable Witness Encryption
2014/3/5
The notion of differing-inputs obfuscation (diO) was introduced by Barak et al. (CRYPTO 2001). It guarantees that, for any two circuits $C_0, C_1$, if it is difficult to come up with an input $x$ on w...
Adaptive Witness Encryption and Asymmetric Password-based Cryptography
Passwords witness encryption
2014/3/6
This paper defines adaptive soundness (AS) security for witness encryption and applies it to provide the first non-invasive schemes for asymmetric password-based encryption (A-PBE). A-PBE offers signi...