搜索结果: 1-7 共查到“军事学 Public Verifiability”相关记录7条 . 查询时间(0.125 秒)
Covert Security with Public Verifiability: Faster, Leaner, and Simpler
secure computation covert security
2018/11/20
The notion of covert security for secure two-party computation serves as a compromise between the traditional semi-honest and malicious security definitions. Roughly, covert security ensures that chea...
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
Authenticated Encryption Public Verifiability Cloud Computing
2017/7/24
In this work the first linearly homomorphic authenticated encryption scheme with public verifiability and provable correctness, called LEPCoV, is presented. It improves the initial proposal by avoidin...
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Aggregator Oblivious Encryption Public Verifiability
2017/5/31
Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can compute an aggregated sum of data and is unable to learn anything else (aggregator obliviousness). Since...
Existing software-based data erasure programs can be summarized as following the same one-bit-return protocol: the deletion program performs data erasure and returns either success or failure. However...
Public Verifiability in the Covert Model (Almost) for Free
secure computation publicly verifiable covert security
2015/12/21
The covert security model (Aumann and Lindell, TCC 2007) offers an important security/-
efficiency trade-off: a covert player may arbitrarily cheat, but is caught with a certain fixed
probability. T...
CCA-Secure PRE Scheme without Public Verifiability
CCA Security Without Pairings Without Public Verifiability PRE
2010/7/14
In a proxy re-encryption (PRE) scheme, a semi-trusted proxy can transform a ciphertext under Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plain...
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Data Dynamics Storage Security Cloud Computing
2009/6/23
Cloud Computing has been envisioned as the next-generation architecture of IT
Enterprise. It moves the application software and databases to the centralized large data
centers, where the management ...