搜索结果: 1-9 共查到“instantiations”相关记录9条 . 查询时间(0.087 秒)
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
threshold cryptography two-party ECDSA
2019/5/21
ECDSA is a widely adopted digital signature standard. Unfortunately, efficient distributed variants of this primitive are notoriously hard to achieve and known solutions often require expensive zero k...
At CRYPTO 2017, Belaïd et al. presented two new private multiplication algorithms over finite fields, to be used in secure masking schemes. To date, these algorithms have the lowest known complex...
Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
Attribute-based signatures generic constructions lattices
2018/1/11
In this work, we affirmatively close the gap between ABS schemes based on bilinear maps and lattices by constructing the first lattice-based ABS scheme for unbounded circuits in the random oracle mode...
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups
Attribute-based encryption Predicate encoding Prime-order bilinear group
2017/9/13
Among all existing identity-based encryption (IBE) schemes in the bilinear group, Wat-IBE proposed by Waters [CRYPTO, 2009] and JR-IBE proposed by Jutla and Roy [AsiaCrypt, 2013] are quite special. A ...
Password-based authenticated key exchange (PAKE) enables two users with shared low-entropy passwords to establish cryptographically strong session keys over insecure networks. At Asiacrypt 2009, Katz ...
The pseudorandom-function oracle-Diffie–Hellman (PRF-ODH) assumption has been introduced recently to analyze a variety of DH-based key exchange protocols, including TLS 1.2 and the TLS 1.3 candidates,...
Agent-based Models as Fictive Instantiations of Ecological Processes
agent-based models ecological modeling instantiations models as fictions philosophy of simulation
2016/5/31
It has been argued that problems in computer simulation bear enough resemblance to recognized issues in the philosophy of modeling that they only pose philosophical challenges analogous to those found...
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
re-encryption average-case obfuscation
2015/12/30
In this work we define multiple relaxations to the definition of
correctness in secure obfuscation. While still remaining meaningful, these
relaxations provide ways to obfuscate many primitives in a...
Centering:A Parametric Theory and Its Instantiations
Centering Parametric Theory Instantiations
2015/8/31
Centering theory is the best-known framework for theorizing about local coherence and salience; however, its claims are articulated in terms of notions which are only partially specified, such as “utt...