搜索结果: 1-15 共查到“FUNCTIONALITIES”相关记录20条 . 查询时间(0.054 秒)
Obfuscating simple functionalities from knowledge assumptions
Obfuscation VBB pattern matching
2019/1/26
This paper shows how to obfuscate several simple functionalities from a new Knowledge of OrthogonALity Assumption (KOALA) in cyclic groups which is shown to hold in the Generic Group Model. Specifical...
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities
Watermarking Scheme Private Constrained Pseudorandom Function Collusion Resilience
2017/12/19
A cryptographic watermarking scheme embeds message into a program while preserving its functionality. Essential security of the watermarking schemes requires that no one could remove the marking messa...
Laser cavities take on new shapes and functionalities
Laser cavities new shapes functionalities
2017/10/26
Researchers have demonstrated the first laser cavity that can confine and propagate light in any shape imaginable, even pathways with sharp bends and angles. The new cavity, called a topological cavit...
Two-Message, Oblivious Evaluation of Cryptographic Functionalities
Oblivious Evaluation Cryptographic Functionalities
2017/9/30
We study the problem of two round oblivious evaluation of cryptographic functionalities. In this setting, one party P1 holds a private key sk for a provably secure instance of a cryptographic function...
2017 9th International Conference on Multiscale Structures and Functionalities for Future Formulatio
2017 9th International Conference Multiscale Structures and Functionalities for Future Formulatio
2017/9/22
We are pleased to announce that Formula IX will be held in Beijing, China on October 15-18, 2017. Formula conference series has long history since 1987 and become an important high-level forum for for...
Watermarking Public-key Cryptographic Functionalities and Implementations
watermarking public -key encryption unremovability,
2017/6/9
A watermarking scheme for a public-key cryptographic functionality enables the embedding of a mark in the instance of the secret-key algorithm such that the functionality of the original scheme is mai...
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
watermarking pseudorandom functions constrained PRFs
2017/5/2
A software watermarking scheme allows one to embed a “mark” into a program without significantly altering the behavior of the program. Moreover, it should be difficult to remove the watermark without ...
Crepeau and Santha, in 1991, posed the question of reversibility of functionalities, that is, which functionalities when used in one direction, could securely implement the identical functionality in ...
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
public-key cryptography functional encryption
2016/3/23
Semi-adaptive security is a notion of security that lies between selective and adaptive security for Attribute-Based Encryption (ABE) and Functional Encryption (FE) systems. In the semi-adaptive model...
Completeness for Symmetric Two-Party Functionalities - Revisited
studying the triviality completeness of functionalities
2016/1/26
Understanding the minimal assumptions required for carrying out cryptographic tasks is one
of the fundamental goals of theoretical cryptography. A rich body of work has been dedicated
to understandi...
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
unctional encryption randomized functionalities punctured programming
2016/1/6
We present a construction of a private-key functional encryption scheme for any family of
randomized functionalities based on any such scheme for deterministic functionalities that is
sufficiently e...
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue
Fugue Random Oracle UC Hash Function
2016/1/4
We define ideal functionalities that are weaker than ideal functionalities traditionally used in realizing variable input length (VIL) random oracles (RO) in the indifferentiability or universal-Compo...
EXTENDING GEO-SPATIAL REPOSITORIES WITH GEO-SEMANTIC PROXIMITY. FUNCTIONALITIES TO FACILITATE THE INTEROPERABILITY OF GEO-SPATIAL DATA
EXTENDING GEO-SPATIAL REPOSITORIES GEO-SEMANTIC FUNCTIONALITIES INTEROPERABILITY GEO-SPATIAL DATA
2015/3/16
EXTENDING GEO-SPATIAL REPOSITORIES WITH GEO-SEMANTIC PROXIMITY. FUNCTIONALITIES TO FACILITATE THE INTEROPERABILITY OF GEO-SPATIAL DATA.
In this work, we present the first definitions and constructions for functional encryption supporting randomized functionalities. The setting of randomized functionalities require us to revisit functi...
Consumers are supporting a variety of new trends in the food market, including sustainability, use of natural ingredients, cleaner labels, gluten-free products, and buying “local.” These individual an...