搜索结果: 1-15 共查到“军事学 definitions”相关记录40条 . 查询时间(0.088 秒)
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Commitment schemes subversion security common reference string model
2019/9/23
A commitment scheme allows a committer to create a commitment to a secret value, and later may open and reveal the secret value in a verifiable manner. In the common reference string model, commitment...
A critique of game-based definitions of receipt-freeness for voting
E-voting receipt-freeness privacy
2019/7/24
We analyse three game-based definitions of receipt-freeness; uncovering soundness issues with two of the definitions and completeness issues with all three. Hence, two of the definitions are too weak,...
We explore definitions of coercion resistance in the computational model of cryptography; discovering all but one are too weak (i.e., satisfiable by voting systems that are not coercion resistant) and...
Leakage-Resilient Group Signature: Definitions and Constructions
group signature full anonymity full traceability
2019/1/9
Group signature scheme provides group members a way to sign messages without revealing their identities. Anonymity and traceability are two essential properties in a group signature system. However, t...
Definitions for Plaintext-Existence Hiding in Cloud Storage
Cloud Storage Side-channel analysis Information Leakage
2018/8/20
Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client si...
Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE
indistinguishability oracle silencing provable security
2018/6/5
Often the simplest way of specifying game-based cryptographic definitions is apparently barred because the adversary would have some trivial win. Disallowing or invalidating these wins can lead to com...
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions
Leakage-resilience authenticated encryption leveled implementations
2018/5/28
We propose definitions and constructions of authenticated encryption (AE) schemes that offer security guarantees even in the presence of side-channel leakages and nonce misuse. This is part of an impo...
Approximate and Probabilistic Differential Privacy Definitions
differential privacy foundations
2018/3/23
This technical report discusses three subtleties related to the widely used notion of differential privacy (DP). First, we discuss how the choice of a distinguisher influences the privacy notion and w...
No-Match Attacks and Robust Partnering Definitions – Defining Trivial Attacks for Security Protocols is Not Trivial
protocols definitions partnering
2017/9/1
An essential cornerstone of the definition of security for key exchange protocols is the notion of partnering. It defines when two protocol instances can be considered to have communicated with each o...
Updatable Tokenization: Formal Definitions and Provably Secure Constructions
Formal Definitions Provably Secure Constructions
2017/7/24
Tokenization is the process of consistently replacing sensitive elements, such as credit cards numbers, with non-sensitive surrogate values. As tokenization is mandated for any organization storing cr...
Subtleties in Security Definitions for Predicate Encryption with Public Index
predicate encryption with public index predicate key-encapsulation mechanism semantic security definition
2017/5/26
We take a critical look at established security definitions for predicate encryption (PE) with public index under chosen-plaintext attack (CPA) and under chosen-ciphertext attack (CCA). In contrast to...
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
Function privacy functional encryption obfuscation
2016/1/27
Private functional encryption guarantees that not only the information in ciphertexts is
hidden but also the circuits in decryption tokens are protected. A notable use case of this notion
is query p...
Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
election schemes individual verifiability universal verifiability
2016/1/3
Definitions of election verifiability in the computational model of cryptography are proposed. The definitions formalize notions of voters verifying their own votes, auditors verifying the tally of vo...
A comprehensive analysis of game-based ballot privacy definitions
Voting Privacy Ballot Privacy
2016/1/3
We critically survey game-based security definitions for the privacy of voting schemes. In addition to known
limitations, we unveil several previously unnoticed shortcomings. Surprisingly, the conclu...
Subversion-Resilient Signatures: Definitions, Constructions and Applications
Signature Schemes Subversion Attacks Tampering
2015/12/30
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is inspired by the prolif...