搜索结果: 1-15 共查到“军事学 blind”相关记录64条 . 查询时间(0.019 秒)
Blind Schnorr Signatures in the Algebraic Group Model
Schnorr signatures blind signatures algebraic group model
2019/8/2
We study the security of schemes related to Schnorr signatures in the algebraic group model (AGM) proposed by Fuchsbauer, Kiltz, and Loss (CRYPTO 2018), where the adversary can only compute new group ...
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Undeniable quantum signature scheme Impersonation attack Quantum asymmetric cryptography
2019/7/15
In recent years, several cryptographic scholars have proposed quantum blind signature schemes. However, their methods require the signatories and the inspectors to share common keys in advance, which ...
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
searchable encryption blind indexing SQL database security
2019/7/15
Rapid advances in Internet technologies have fostered the emergence of the “software as a service” model for enterprise computing. The “Database as a Service” model provides users with the power to cr...
A Modular Treatment of Blind Signatures from Identification Schemes
Blind signature identification schemes Forking Lemma
2019/3/6
We propose a modular security treatment of blind signatures derived from linear identification schemes in the random oracle model. To this end, we present a general framework that captures several wel...
Quantum-secure message authentication via blind-unforgeability
quantum quantum access model unforgeability
2018/12/3
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not direc...
Blind Certificate Authorities
anonymity MPC TLS
2018/11/2
We explore how to build a blind certificate authority (CA). Unlike conventional CAs, which learn the exact identity of those registering a public key, a blind CA can simultaneously validate an identit...
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
Blind signature ECDSA Paillier cryptosystem
2018/7/9
In this paper, we consider a scenario where a bitcoin liquidity provider sells bitcoins to clients. When a client pays for a bitcoin online, the provider is able to link the client's payment informati...
Conditional Blind Signatures
digital signatures blind signatures designated verifier signatures
2017/7/19
We propose a novel cryptographic primitive that we call conditional blind signatures. Our primitive allows a user to request blind signatures on messages of her choice. The signer has a secret Boolean...
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
serious violations input integrity
2017/6/22
We describe novel, adaptive user interface attacks, where the adversary attaches a small device to the interface that connects user input peripherals to the target system. The device executes the atta...
Efficient Round-Optimal Blind Signatures in the Standard Model
Blind Signatures Round-Optimal Partial Blindness
2017/2/20
Blind signatures are at the core of e-cash systems and has numerous other applications. In this work we construct efficient blind and partially blind signature schemes over bilinear groups in the stan...
A Practical Multivariate Blind Signature Scheme
Multivariate Cryptography Blind Signatures Rainbow Signature Scheme
2017/2/20
Multivariate Cryptography is one of the main candidates for creating post-quantum cryptosystems. Especially in the area of digital signatures, there exist many practical and secure multivariate scheme...
Blind Web Search: How far are we from a privacy preserving search engine?
fully homomorphic encryption privacy preserving applications encrypted web search
2016/12/10
Recent rapid progress in fully homomorphic encryption (FHE) and somewhat homomorphic encryption
(SHE) has catalyzed renewed efforts to develop efficient privacy preserving protocols. Several works
h...
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
Blind Signatures Standard Model SPS-EQ
2016/6/29
At Crypto’15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standardmodel
construction of efficient round-optimal blind signatures that does not require complexity
leveraging. It is conce...
Blind Password Registration for Verifier-based PAKE
blind password registration verifier-based PAKE
2016/5/9
We propose Blind Password Registration (BPR), a new class of cryptographic protocols that is instrumental for secure registration of client passwords at remote servers with additional protection again...
Blind Source Separation from Single Measurements using Singular Spectrum Analysis
side-channel analysis signal processing filtering
2016/3/23
Singular Spectrum Analysis (SSA) is a powerful data decomposition/recomposition technique that can be used to reduce the noise in time series. Compared to existing solutions aiming at similar purposes...