搜索结果: 1-3 共查到“军事学 Verifiable Encryption”相关记录3条 . 查询时间(0.128 秒)
One-Shot Verifiable Encryption from Lattices
Verifiable encryption proofs of plaintext knowledge lattice cryptography
2017/2/20
Verifiable encryption allows one to prove properties about encrypted data and is an important building block in the design of cryptographic protocols, e.g., group signatures, key escrow, fair exchange...
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology
Cut-and-Choose Verifiable Encryption Fair Exchange Protocols Trusted Computing Technology
2009/9/11
Cut-and-choose is used in interactive zero-knowledge protocols in which a prover answers a series
of random challenges that establish with high probability that the prover is honestly following the d...
Practical Verifiable Encryption and Decryption of Discrete Logarithms
Verifiable encryption verifiable decryption adaptive chosen ciphertext security
2009/4/15
This paper addresses the problem of designing practical protocols for proving properties
about encrypted data. To this end, it presents a variant of the new public key encryption of
Cramer and Shoup...