搜索结果: 1-8 共查到“军事学 circular security”相关记录8条 . 查询时间(0.046 秒)
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions
identity-based encryption anonymity leakage resilience
2017/10/9
In anonymous identity-based encryption (IBE), ciphertexts not only hide their corresponding messages, but also their target identity. We construct an anonymous IBE scheme based on the Computational Di...
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
Black-box separations circular security
2017/2/21
We address the problems of whether t-circular-secure encryption can be based on (t-1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based...
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
Errors Assumption Symmetric-Key Bit Encryption
2017/2/20
In this work we separate private-key semantic security from circular security using the Learning with Error assumption. Prior works used the less standard assumptions of multilinear maps or indistingu...
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
Circular Security every IND-CPA cryptosystem
2017/2/20
One interesting question is whether circular security comes for free from IND-CPA security. Recent works have addressed this question, showing that for all integers n, there exists an IND-CPA scheme t...
Circular Security Counterexamples for Arbitrary Length Cycles from LWE
circular security Learning with Errors
2016/2/23
We describe a public key encryption that is IND-CPA secure under the Learning with Errors (LWE)
assumption, but that is not circular secure for arbitrary length cycles. Previous separation results fo...
New Circular Security Counterexamples from Decision Linear and Learning with Errors
circular security encryption Decision Linear
2015/12/24
We investigate new constructions of n-circular counterexamples with a focus on the case of n = 2. We
have a particular interest in what qualities a cryptosystem must have to be able to separate such ...
Obfuscation ==> (IND-CPA Security =/=> Circular Security)
Circular Security Related Key Attack Obfuscation
2014/3/6
Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security the adversary is given an extra ``hint'' consisting of...
Separations in Circular Security for Arbitrary Length Key Cycles
Separations Arbitrary Length Key Cycles
2014/3/6
While standard notions of security suffice to protect any message supplied by an adversary, in some situations stronger notions of security are required. One such notion is n-circular security, where ...