搜索结果: 1-15 共查到“hiding”相关记录64条 . 查询时间(0.062 秒)
Using artificial intelligence to find anomalies hiding in massive datasets(图)
人工智能 数据集 机器学习技术 电网故障
2023/6/20
Astronomers find elusive target hiding behind dust(图)
Astronomers elusive target hiding behind dust
2020/6/19
Astronomers acting on a hunch have likely resolved a mystery about young, still-forming stars and the regions rich in organic molecules closely surrounding some of them. The scientists used the N...
On the Difficulty of Hiding the Balance of Lightning Network Channels
Bitcoin Blockchain Network Security
2019/4/1
The Lightning Network is a second layer technology running on top of Bitcoin and other Blockchains. It is composed of a peer-to-peer network, used to transfer raw information data. Some of the links i...
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
attribute based signature anonymous credentials threshold cryptography
2019/3/1
In this work, we revisit multi-authority attribute based signatures (MA-ABS), and elaborate on the limitations of the current MA-ABS schemes to provide a hard to achieve (yet very useful) combination ...
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
functional encryption inner product tight security
2019/2/27
Tightly secure cryptographic schemes have been extensively studied in the fields of chosen-ciphertext secure public-key encryption (CCA-secure PKE), identity-based encryption (IBE), signature and more...
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Searchable Encryption Hidden Vector Encryption Leakage Profile
2018/12/3
The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken new ground in designing efficient searchable symmetric encryption (SSE) protocol with support for conjunctive keyword...
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
public-key cryptography Full Attribute-hiding
2018/11/16
In this work, we propose two IPE schemes achieving both adaptive security and full attribute-hiding in the prime-order bilinear group, which improve upon the unique existing result satisfying both fea...
Strong Leakage Resilient Encryption by Hiding Partial Ciphertext
Leakage Resillient Encryption Steal Resillient Encryption Secret Sharing
2018/11/16
Leakage-resilient encryption is a powerful tool to protect data confidentiality against side channel attacks. In this work, we introduce a new and strong leakage setting to counter backdoor (or trojan...
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
predicate encryption partially-hiding simulation-based adaptive security
2018/11/13
This paper demonstrates how to achieve simulation-based strong attribute hiding against adaptive adversaries for predicate encryption (PE) schemes supporting expressive predicate families under standa...
Proofs of Ignorance and Applications to 2-Message Witness Hiding
Witness Hiding Witness Indistinguishability Zero Knowledge
2018/11/9
We consider the following paradoxical question: Can one prove lack of knowledge? We define the notion of Proofs of Ignorance, construct such proofs, and use these proofs to construct a 2-message witne...
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
public-key cryptography attribute-based encryption
2018/8/21
Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and po...
Definitions for Plaintext-Existence Hiding in Cloud Storage
Cloud Storage Side-channel analysis Information Leakage
2018/8/20
Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client si...
Parameter-Hiding Order Revealing Encryption
secret-key cryptography Order Revealing Encryption
2018/7/24
Order-revealing encryption (ORE) is a popular primitive for outsourcing encrypted databases, as it allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works...
Context Hiding Multi-Key Linearly Homomorphic Authenticators
Delegated Computation Homomorphic Authenticators Context Hiding
2018/6/27
Demanding computations are increasingly outsourced to cloud platforms. For such outsourced computations, the efficient verifiability of results is a crucial requirement. When sensitive data is involve...
Topology-Hiding Computation Beyond Semi-Honest Adversaries
topology-hiding broadcast topology-hiding computation fail-stop
2018/3/8
Topology-hiding communication protocols allow a set of parties, connected by an incomplete network with unknown communication graph, where each party only knows its neighbors, to construct a complete ...