搜索结果: 1-8 共查到“军事学 leveled”相关记录8条 . 查询时间(0.062 秒)
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
Homomorphic Encryption Oblivious RAM
2019/6/24
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to hide access pattern to its data encrypted and stored at a remote server. Traditionally, ORAM algorithms assume the server acts...
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions
Leakage-resilience authenticated encryption leveled implementations
2018/5/28
We propose definitions and constructions of authenticated encryption (AE) schemes that offer security guarantees even in the presence of side-channel leakages and nonce misuse. This is part of an impo...
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication
LWE LPN IoT
2017/7/19
Leveled authentication allows resource-constrained IoT devices to be authenticated at different strength levels according to the particular types of communication. To achieve efficient leveled authent...
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme
Levelled homomorphic encryption adaptive attacks
2016/12/26
A major open problem is to protect leveled homomorphic encryption from adaptive attacks that allow an adversary to learn the private key. The only positive results in this area are by Loftus, May, Sma...
In a homomorphic signature scheme, given a vector of signatures σ⃗ corresponding to a dataset of messages μ⃗ , there is a {\it public} algorithm that allows to derive a signature σ′ for m...
Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
fully homomorphic encryption identity-based FHE multi-key FHE
2016/1/6
Gentry, Sahai and Waters recently presented the first (leveled)
identity-based fully homomorphic (IBFHE) encryption scheme (CRYPTO
2013). Their scheme however only works in the single-identity setti...
Leveled Fully Homomorphic Signatures from Standard Lattices
Homomorphic Signatures Lattices Outsourcing Computation
2016/1/6
In a homomorphic signature scheme, a user Alice signs some large dataset x using her secret
signing key and uploads the signed data to an untrusted remote server. The server can then run
some comput...
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
full domain hash identity-based aggregate signatures
2014/3/11
In this work, we explore building constructions with full domain hash structure, but with standard model proofs that do not employ the random oracle heuristic. The launching point for our results will...