搜索结果: 1-15 共查到“Message”相关记录217条 . 查询时间(0.562 秒)
Substitution Attacks against Message Authentication
Algorithm Substitution Attacks Authentication Mass Surveillance
2019/9/3
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In light of revelations concerning mass surveillance, ASAs were initially introduced by Bellare, Paterson ...
Composable and Finite Computational Security of Quantum Message Transmission
Quantum cryptography composable security computational security
2019/8/14
Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the li...
We construct a 2-message publicly verifiable witness indistinguishable argument system for NP assuming that the Learning with Errors (LWE) problem is subexponentially hard. Moreover, the protocol is `...
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation
zero-knowledge NIZK RSA ZAP
2019/6/26
In this paper we put forth new one-message proof systems for several practical applications, like proving that an El Gamal ciphertext (over a multiplicative group) decrypts to a given value and correc...
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
message franking designated verifier signatures deniability
2019/5/28
Content moderation is crucial for stopping abuse and harassment via messaging on online platforms. Existing moderation mechanisms, such as message franking, require platform providers to see user iden...
Faster Bootstrapping of FHE over the integers with large prime message space
Fully homomorphic encryption Bootstrapping Restricted depth-3 circuit
2019/5/27
Efficient Message Authentication Codes with Combinatorial Group Testing
Message authentication code Combinatorial group testing Data corruption
2019/4/23
Message authentication code, MAC for short, is a symmetric-key cryptographic function for authenticity. A standard MAC verification only tells whether the message is valid or invalid, and thus we can ...
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
chosen ciphertext security trapdoor functions key dependent message security
2019/3/20
We study the relationship among public-key encryption (PKE) satisfying indistinguishability against chosen plaintext attacks (IND-CPA security), that against chosen ciphertext attacks (IND-CCA securit...
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
stream cipher RC4 VMPC-R
2019/1/18
We propose an authenticated encryption scheme for the VMPC-R stream cipher. VMPC-R is an RC4-like algorithm proposed in 2013. It was created in a challenge to find a bias-free cipher within the RC4 de...
Fast Message Franking: From Invisible Salamanders to Encryptment
authenticated encryption encrypted messaging
2019/1/9
Message franking enables cryptographically verifiable reporting of abusive content in end-to-end encrypted messaging. Grubbs, Lu, and Ristenpart recently formalized the needed underlying primitive, wh...
Quantum-secure message authentication via blind-unforgeability
quantum quantum access model unforgeability
2018/12/3
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not direc...
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission
mobile tt-adversary PSMT
2018/12/3
In a network of nn nodes (modelled as a digraph), the goal of a perfectly secret message transmission (PSMT) protocol is to replicate sender's message mm at the receiver's end without revealing any in...
Proofs of Ignorance and Applications to 2-Message Witness Hiding
Witness Hiding Witness Indistinguishability Zero Knowledge
2018/11/9
We consider the following paradoxical question: Can one prove lack of knowledge? We define the notion of Proofs of Ignorance, construct such proofs, and use these proofs to construct a 2-message witne...
We pursue to formalize and instantiate a secure bidirectional channel with message franking properties. Under this model a sender may send an abusive message to the receiver and the latter wish to ope...
Private Message Franking with After Opening Privacy
message franking protocols abusive reports messaging applications
2018/11/7
Recently Grubbs et al. [GLR17] initiated the formal study of message franking protocols. This new type of service launched by Facebook, allows the receiver in a secure messaging application to verifia...