搜索结果: 1-12 共查到“subversion”相关记录12条 . 查询时间(0.11 秒)
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Commitment schemes subversion security common reference string model
2019/9/23
A commitment scheme allows a committer to create a commitment to a secret value, and later may open and reveal the secret value in a verifiable manner. In the common reference string model, commitment...
Subversion in Practice: How to Efficiently Undermine Signatures
cryptanalysis digital signatures implementation
2018/12/19
Algorithm substitution attack (ASA) on signatures should be treated seriously as the authentication services of numerous systems and applications rely on signature schemes and compromising them has a ...
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups
Public-key encryption subversion mass surveillance
2018/1/11
We initiate the study of public-key encryption (PKE) schemes and key-encapsulation mechanisms (KEMs) that retain security even when public parameters (primes, curves) they use may be untrusted and sub...
At Asiacrypt 2016 Bellare, Fuchsbauer and Scafuro introduced the notion of subversion zero knowledge for non-interactive proof systems, demanding that zero knowledge (ZK) is maintained even when the c...
A Subversion-Resistant SNARK
Common reference string generic group model non-interactive zero knowledge
2017/6/22
While succinct non-interactive zero-knowledge arguments of knowledge (zk-SNARKs) are widely studied, the question of what happens when the CRS has been subverted has received little attention. In ASIA...
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
signatures subversion mass surveillance
2016/12/8
This paper presents highly efficient designs of double authentication preventing signatures (DAPS). In a DAPS, signing two messages with the same first part and differing second parts reveals the sign...
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
Parameter Subversion CRS
2016/4/15
Motivated by the subversion of ``trusted'' public parameters in mass-surveillance activities, this paper studies the security of NIZKs in the presence of a maliciously chosen common reference string. ...
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
Hedged encryption randomness subversion
2016/1/6
This paper provides the first efficient, standard-model, fully-secure schemes for some related and
challenging forms of public-key encryption (PKE), namely deterministic and hedged PKE. These forms
...
Subversion-Resilient Signatures: Definitions, Constructions and Applications
Signature Schemes Subversion Attacks Tampering
2015/12/30
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is inspired by the prolif...
A Quiver Full of Mommy Blogs: Ideological Subversion and Reinforcement of Mothering Models Online
mommy blogs the Quiverfull Movement ideological criticism muted group theory intensive mothering fundamentalist Christians feminist rhetorical theory
2015/1/8
In this study, ideological criticism combined with use of muted group theory are employed to analyze four Quiverfull mothering blogs in order to unveil the models of mothering and maternal messages th...
The Dialogic Emergence of ‘Truth’ in Politics:Reproduction and Subversion of the ‘War on Terror’ Discourse
Dialogic Emergence Politics Discourse
2008/12/26
Truth claims in political discourse are implicated in a dialogic process whereby
political actors "assimilate, rework, and re-accentuate" prior discourse (Bakhtin
1986:89). While political actors th...
Memory and Memoir: Resurrection and Subversion in Sylvia Plath's “Daddy”
Memory Memoir::Resurrection Subversion Sylvia Plath's “Daddy”
2010/9/30
Theorists and cultural critics, all over the world are highly involved in trying to find out answers to the puzzles of identity and subjectivity. What is identity? Is it the “self” in a monolithic exi...