搜索结果: 1-8 共查到“军队指挥学 Security Models”相关记录8条 . 查询时间(0.109 秒)
On the Relation Between SIM and IND-RoR Security Models for PAKEs
Security Models SIM-based Security IND-based Security
2017/5/31
Password-based Authenticated Key-Exchange (PAKE) protocols allow users, who need only to share a password, to compute a high-entropy shared session key despite passwords being taken from a dictionary....
SoK: Security Models for Pseudo-Random Number Generators
Pseudo-random number generation security models entropy
2017/3/2
Randomness plays an important role in multiple applications in cryptography. It is required in fundamental tasks such as key generation, masking and hiding values, nonces and initialization vectors ge...
Shorter Circuit Obfuscation in Challenging Security Models
virtual-black-box indistinguishability-secure
2016/5/3
The study of program obfuscation is seeing great progress in recent years, which is crucially
attributed to the introduction of graded encoding schemes by Garg, Gentry and Halevi (Eurocrypt
2013). I...
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes
Certificateless signature Security model Public key replacement Strong unforgeability
2013/4/18
Certificateless signatures (CLSs) were introduced to solve the key escrow problem of identity-based signatures. In CLS, the full private key is determined by neither the user nor the trusted third par...
On the security models for certificateless signature schemes achieving level 3 security
public-key cryptography /certificateless public key cryptography certificateless signature Gi-rault's trust level level 3 security
2012/3/23
key cryptography has found many applications in our modern society. To guarantee the authenticity of public keys, we need a trusted third party (TTP). In 1991, Girault defined three trust levels for a...
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Security Models Authenticated Key Exchange Session-state Ephemeral-key
2009/6/15
Many recent protocols for Authenticated Key Exchange have been proven correct
in the CK, CK-HMQV, or eCK security models. The exact relation between the security
models, and hence between the securi...
On Security Models and Compilers for Group Key Exchange Protocols
Group key exchange extended security model malicious participants
2008/12/26
Group key exchange (GKE) protocols can be used to guarantee confidentiality and group authentication in a variety of group applications. The notion of provable security subsumes the existence of an ab...
A Survey of Certificateless Encryption Schemes and Security Models
Certificateless Encryption Schemes Security Models
2008/12/1
This paper surveys the literature on certificateless
encryption schemes. In particular, we examine the large
number of security models that have been proposed to prove
the security of certificatele...