搜索结果: 1-5 共查到“Bounded Storage Model”相关记录5条 . 查询时间(0.109 秒)
Simple Schemes in the Bounded Storage Model
Bounded Storage Model Commitment Oblivious Transfer
2019/5/21
The bounded storage model promises unconditional security proofs against computationally unbounded adversaries, so long as the adversary’s space is bounded. In this work, we develop simple new constru...
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
Bounded storage model error correction commitment oblivious transfer
2015/12/22
In the bounded storage model the memory of the adversary is restricted, instead of its
computational power. With this different restriction it is possible to design protocols with
information-theore...
Achieving the physical limits of the bounded-storage model
physical limits bounded-storage model
2010/10/19
Secure two-party cryptography is possible if the adversary’s quantum storage device suffers imperfections.For example, security can be achieved if the adversary can store strictly less then half of th...
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
extractors bounded storage model everlasting security
2009/4/15
We consider the problem of constructing randomness extractors which are locally computable,
i.e. only read a small number of bits from their input. As recently shown by Lu (CRYPTO
‘02 ), locally com...
Intrusion-Resilience via the Bounded-Storage Model
Intrusion-Resilience Bounded-Storage Model cryptographic protocol
2009/2/12
We introduce a new method of achieving intrusion-resilience
in the cryptographic protocols. More precisely we show how to preserve
security of such protocols, even if a malicious program (e.g. a vir...