搜索结果: 1-13 共查到“军事学 Certification”相关记录13条 . 查询时间(0.046 秒)
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
side-channel analysis security evaluations mutual information
2019/2/27
Leakage certification aims at guaranteeing that the statistical models used in side-channel security evaluations are close to the true statistical distribution of the leakages, hence can be used to ap...
Schnorr-based implicit certification: improving the security and efficiency of V2X communications
Vehicular communications (V2X) implicit certificates butterfly key expansion
2019/2/25
In the implicit certification model, the process of verifying the validity of the signer's public key is combined with the verification of the signature itself. When compared to traditional, explicit ...
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation
quantum cryptography Mixed Quantum States
2018/11/8
We investigate sampling procedures that certify that an arbitrary quantum state on nn subsystems is close to an ideal mixed state φ⊗nφ⊗n for a given reference state φφ, up to errors on a f...
Information Entropy Based Leakage Certification
information theory maximum entropy maximum entropy distribution
2018/11/6
Side-channel attacks and evaluations typically utilize leakage models to extract sensitive information from measurements of cryptographic implementations. Efforts to establish a true leakage model is ...
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli
RSA parameter validation zero-knowledge proofs
2018/1/12
Certain RSA-based protocols, for instance in the domain of group signatures, require a prover to convince a verifier that a set of RSA parameters is well-structured (e.g., that the modulus is the prod...
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
secure multiparty computation garbled circuit input correctness
2017/6/15
Secure multi-party computation allows a number of participants to securely evaluate a function on their private inputs and has a growing number of applications. Two standard adversarial models that tr...
Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016)
Cryptanalysis Attribute-Based Signatures Anonymous Credentials
2016/12/8
Anonymous credential systems enable users to authenticate themselves in a privacy-preserving manner. At
the conference ESORICS 2016, Kaaniche and Laurent presented an anonymous certification scheme b...
Certification and Efficient Proofs of Committed Topology Graphs
data aggregation privacy time-series data
2016/1/23
Abstract. With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solut...
Side-channel attacks generally rely on the availability of good
leakage models to extract sensitive information from cryptographic implementations.
The recently introduced leakage certification test...
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
authenticated key exchange (AKE) unknown key share (UKS) attacks
2014/3/12
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there...
Universally Composable Signature, Certification, and Authentication
Composable Signature Certification Authentication
2009/4/10
Recently some efforts were made towards capturing the security requirements from digital
signature schemes as an ideal functionality within a composable security framework. This
modeling of digital ...
Provably Secure Delegation-by-Certification Proxy Signature Schemes
digital signature proxy signature bilinear map
2009/3/27
In this paper, we first show that previous proxy signature schemes by delegation
with certificate are not provably secure under adaptive-chosen message
attacks and adaptive-chosen warrant attacks. T...
New Public Key Authentication Frameworks with Lite Certification Authority
Public Key Authentication Frameworks Lite Certification Authority
2008/11/19
Two variants of CA-based public key authentication frame-
work are proposed in this paper. The one is termed as public key cryp-
tosystem without certificate management center (PKCwCMC) and the
oth...