搜索结果: 1-15 共查到“Setting”相关记录258条 . 查询时间(0.109 秒)
Efficient zero-knowledge arguments in the discrete log setting, revisited
zero-knowledge argument quadratic equations arithmetic circuit satisfiability
2019/8/20
This work revisits zero-knowledge proofs in the discrete logarithm setting. First, we identify and carve out basic techniques (partly being used implicitly before) to optimize proofs in this setting. ...
A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting
SPN AES Exchange Attack
2019/8/20
In this paper, we study the results of the recently proposed exchange attack in an adaptive setting. As expected, it leads to present a better 6-round key-independent distinguisher in terms of data an...
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting
puncturable encryption forward secrecy distributed setting
2019/8/14
Managing sensitive data in highly-distributed environments is gaining a lot of attention recently. Often, once data is presented to such environments, this data is persistent there. Being able to "for...
SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting
modes of operation lightweight cryptography authenticated encryption
2019/6/19
Block cipher modes of operation provide a way to securely encrypt using a block cipher, and different modes of operation achieve different tradeoffs of security, performance and simplicity. In this pa...
Public-Key Cryptography in the Fine-Grained Setting
Fine-grained Public-Key One-Way-Function
2019/6/4
Cryptography is largely based on unproven assumptions, which, while believable, might fail. Notably if P=NPP=NP, or if we live in Pessiland, then all current cryptographic assumptions will be broken. ...
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
proof-of-stake secure initialization uniqueness
2019/5/13
We present "UniqueChain", a proof-of-stake based blockchain protocol that achieves secure initialization of newly joining parties without any additional trusted assumptions and fast messages (transact...
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
secret sharing non-malleability leakage resilience computational security
2019/2/27
We revisit the concept of *non-malleable* secret sharing (Goyal and Kumar, STOC 2018) in the computational setting. In particular, under the assumption of one-to-one one-way functions, we exhibit a *c...
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
oblivious RAM muli-server perfect security
2018/11/15
The problem of Oblivious RAM (ORAM) has traditionally been studied in the single-server setting, but more recently the multi-server setting has also been considered. Yet it is still unclear whether th...
On Tightly Secure Primitives in the Multi-Instance Setting
Tight reductions Primitives Reductions
2018/11/6
We initiate the study of general tight reductions in cryptography. There already exist a variety of works that offer tight reductions for a number of cryptographic tasks, ranging from encryption and s...
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature
Bilinear target assumption q-type assumption DejaQ technique and Dual form signature technique
2018/8/16
A large number of parameterized complexity assumptions have been introduced in the bilinear pairing setting to design novel cryptosystems and an important question is whether such ``qq-type" assumptio...
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions
Leakage-resilience authenticated encryption leveled implementations
2018/5/28
We propose definitions and constructions of authenticated encryption (AE) schemes that offer security guarantees even in the presence of side-channel leakages and nonce misuse. This is part of an impo...
Metallogenic Mechanism and Tectonic Setting of Tungsten Mineralization in the Yangbishan Deposit in Northeastern China
scheelite Yangbishan iron–tungsten deposit Early Paleozoic late Pan-African period Central Asian Orogenic Belt
2018/4/10
The Yangbishan iron–tungsten deposit in the Shuangyashan area of Heilongjiang Province is located in the center of the Jiamusi Massif in northeastern China. The rare earth element and trace element co...
Platinum-Group Elements Geochemistry and Chromian Spinel Composition in Podiform Chromitites and Associated Peridotites from the Cheshmeh-Bid Deposit, Neyriz, Southern Iran: Implications for Geotectonic Setting
Cheshmeh-Bid Chromitite trace elements platinum-group elements boninitic magma supra-subduction zone
2018/4/10
Dunite and serpentinized harzburgite in the Cheshmeh-Bid area, northwest of the Neyriz ophiolite in Iran, host podiform chromitite that occur as schlieren-type, tabular and aligned massive lenses of v...
Geochronology, Geochemistry and Sr-Nd-Pb-Hf Isotopes of No. I Complex from the Shitoukengde Ni–Cu Sulfide Deposit in the Eastern Kunlun Orogen, Western China: Implications for the Magmatic Source, Geodynamic Setting and Genesis
Sr-Nd-Pb-Hf isotopes crustal contamination oceanic slab break-off post-collisional extension Shitoukengde Ni-Cu deposit Eastern Kunlun Orogen
2018/4/10
The Shitoukengde Ni-Cu deposit, located in the Eastern Kunlun Orogen, comprises three mafic–ultramafic complexes, with the No. I complex hosting six Ni-Cu orebodies found recently. The deposit is host...
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
Smartphones PIN Sensor
2017/12/6
A range of zero-permission sensors are found in modern smartphones to enhance user experience. These sensors can lead to unintentional leakage of user private data. In this paper, we combine leakage f...