搜索结果: 1-9 共查到“compilers”相关记录9条 . 查询时间(0.046 秒)
Rate-Optimizing Compilers for Continuously Non-Malleable Codes
non-malleable codes tamper-proof security
2019/1/26
For the case of split-state tampering, we establish the existence of rate-one continuously non-malleable codes with computational security, in the (non-programmable) random oracle model. We further ex...
It is tempting to think that if we encrypt a sequence of messages {xi} using a semantically secure encryption scheme, such that each xi is encrypted with its own independently generated public key pki...
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
After-the-Fact leakage bounded memory leakage split-state
2017/5/25
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the adversary obtains side-channel information from the real world implementation of these a...
Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems
Arguments Interactive Proofs
2016/3/18
We are interested in constructing short two-message arguments for various languages, where
the complexity of the verifier is small (e.g. linear in the input size, or even sublinear if it is
coded pr...
The goal of leakage-resilient cryptography is to construct
cryptographic algorithms that are secure even if the devices on which
they are implemented leak information to the adversary. One of the ma...
Generic Compilers for Authenticated Key Exchange
authenticated key agreement protocol compiler TLS
2010/12/9
So far, all solutions proposed for {\em authenticated key agreement} combine key agreement and authentication into a single cryptographic protocol. However, in many important application scenarios, ke...
Scalable Compilers for Group Key Establishment : Two/Three Party to Group
Group Key Exchange Compilers Tree Based Group Key Exchange Circular topology
2009/6/12
This work presents the first scalable, efficient and generic compilers to construct group key
exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose
three diffe...
Efficient Compilers for Authenticated Group Key Exchange
Efficient Compilers Authenticated Group Key Exchange
2009/3/10
In this paper we propose two compilers which are designed to transform a
group key exchange protocol secure against any passive adversary into an
authenticated group key exchange protocol with key c...
On Security Models and Compilers for Group Key Exchange Protocols
Group key exchange extended security model malicious participants
2008/12/26
Group key exchange (GKE) protocols can be used to guarantee confidentiality and group authentication in a variety of group applications. The notion of provable security subsumes the existence of an ab...