搜索结果: 1-15 共查到“confidentiality”相关记录17条 . 查询时间(0.046 秒)
Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions
Zero-knowledge Proofs Confidential Transactions Zcoin
2019/4/15
We propose Lelantus, a new anonymous payment system which ensures both transaction confidentiality and anonymity with small proof sizes, short verification times and without requiring a trusted setup.
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
OCB2 Authenticated Encryption Cryptanalysis
2019/3/21
We present practical attacks on OCB2. This mode of operation of a blockcipher was designed with the aim to provide particularly efficient and provably-secure authenticated encryption services, and sin...
libInterMAC: Beyond Confidentiality and Integrity in Practice
fragmentation attack SSH Authenticated Encryption
2019/2/25
Boldyreva et al. (Eurocrypt 2012) defined a fine-grained security model capturing ciphertext fragmentation attacks against symmetric encryption schemes. The model was extended by Albrecht et al. (CCS ...
The 3rd Generation Partnership Project (3GPP) recently proposed a standard for 5G telecommunications, containing an identity protection scheme meant to address the long-outstanding privacy problem of ...
OCB2 is a widely standardized mode of operation of a blockcipher that aims at providing authenticated encryption. A recent report by Inoue and Minematsu (IACR EPRINT report 2018/1040) indicates that O...
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
PKG IND CCA
2017/3/6
ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certificate management like Public Key Infr...
A QKD-based digital archiving solution providing everlasting confidentiality and integrity
QKD secret sharing commitments
2016/12/12
With increasing digitization, the amount of archived data that requires long-term protection of confidentiality and integrity increases rapidly. Examples include electronic health records, genome data...
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Collaborative filtering Outsourcing Integrity
2016/2/24
In the cloud computing era, in order to avoid the computational burdens, many recommendation service providers tend to outsource their collaborative filtering computations to third-party cloud servers...
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
network homomorphic WSN Wireless Sensor Network
2015/12/22
Wireless Sensor Networks (WSN) has become more
and more important in many applications especially those required
a high level of security such as: commercial, military
and telemedicine applications...
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
Data confidentiality multi-tenancy audit-trail log
2015/12/18
Cloud computing is delivery of services rather
than a product and among different cloud deployment models,
the public cloud provides improved scalability and cost reduction
when compared to others....
Confidentiality is crucial in the provision of youth friendly services. Privacy and confidentiality are distinct concepts. Confidentiality ensure privacy. The promotion of young people's sexual and re...
Cognitive Impairment and Dangerous Driving: A Decision Making Model for the Psychologist to Balance Confidentiality with Safety
Cognitive Disorders Policy Ethics Law Driving
2013/2/21
The Transitional Opportunity Partnership (TOP) is a framework for psychological care of cognitively impaired individuals. In this paper we address the issues associated with cognitively impaired drive...
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
attribute-based encryption encrypted search
2011/1/18
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are sent to intereste...
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
attribute-based encryption encrypted search
2012/3/30
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are sent to intereste...
Celebrity/Employee Confidentiality Agreements: How to Make Them Work
Confidentiality Privacy Confidentiality Agreements Drafting
2009/12/25
It has come to light in recent years that confidentiality agreements between celebrities and their employees do not effectively protect celebrity privacy. Even celebrities as rich and powerful as Davi...