搜索结果: 1-15 共查到“军事学 Update”相关记录20条 . 查询时间(0.078 秒)
Securing Update Propagation with Homomorphic Hashing
Homomorphic Hashing Folly open-source library
2019/3/4
In database replication, ensuring consistency when propagating updates is a challenging and extensively studied problem. However, the problem of securing update propagation against malicious adversari...
We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the most common cryptograph...
Bidirectional Asynchronous Ratcheted Key Agreement without Key-Update Primitives
secure communication post-compromise security ratchet
2018/11/9
Following up mass surveillance and privacy issues, modern secure communication protocols now seek for more security such as forward secrecy and post-compromise security. They cannot rely on any assump...
Message-locked Encryption with File Update
Message-locked encryption symmetric key cryptography hash mode of operation
2018/5/11
Message-locked encryption (MLE) (formalized by Bellare, Keelveedhi and Ristenpart, 2013) is an important cryptographic primitive that supports deduplication in the cloud. Updatable block-level message...
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
Secure Enclaves Intel SGX Oblivious Data Structures
2018/3/8
Ability to query and update over encrypted data is an essential feature to enable breach-resilient cyber-infrastructures. Statistical attacks on searchable encryption (SE) have demonstrated the import...
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
system security software updates decentralization
2017/7/6
Software-update mechanisms are critical to the security of modern systems, but their typically centralized design presents a lucrative and frequently attacked target. In this work, we propose CHAINIAC...
Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud
Access Control Attribute-based Encryption Policy Updating
2016/7/5
How to flexibly change the access policy after the initial data access policy has
been set is a critical problem to promote attribute-based encryption (ABE) from a theoretical
tool to a practical to...
Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption
public-key cryptography Ciphertext-policy attribute-based encryption
2016/5/17
Ciphertext-policy attribute-based encryption (CP-ABE) is regarded as a promising cryptographic tool for encrypted access control in public cloud storage systems. However, a problem for CP-ABE schemes ...
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys
Identity-based encryption Hierarchical identity-based encryption Key revocation
2016/5/17
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that supports the
revocation of user’s private keys to manage the dynamic credentials of users in a system. Many diffe...
Fast and Secure Linear Regression and Biometric Authentication with Security Update
Homomorphic encryption LWE assumption
2015/12/29
We explicitly present a homomorphic encryption scheme with a flexible encoding of plaintexts.
We prove its security under the LWE assumption, and innovatively show how the scheme can be
used to hand...
Chaskey: a MAC Algorithm for Microcontrollers– Status Update and Proposal of Chaskey-12 –
Chaskey-12 Message Authentication Code Microcontroller
2015/12/18
The Chaskey MAC algorithm was presented by Mouha et al.
at SAC 2014. It is designed for real-world applications where 128-bit keys
are required, but standard cryptographic algorithms cannot be imple...
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
Privacy Cloud Computing
2014/3/6
We present RASP, a new protocol for privacy-preserving range search and sort queries on encrypted data in the face of an untrusted data store. RASP has several advantages over existing work. First, RA...
Revocable IBE Systems with Almost Constant-size Key Update
identity-based encryption revocation
2014/3/10
Identity-based encryption (IBE) has been regarded as an attractive alternative to more conventional certificate-based public key systems. It has recently attracted not only considerable research from ...
Comments on a password authentication and update scheme based on elliptic curve cryptography
Password authentication, Elliptic curve cryptography offline password guessing attack stolen-verifier attack and privileged insider attack
2012/3/27
The security of a password authentication and update scheme based on elliptic curve cryptography proposed by Islam et al. [S.K. Hafizul Islam, G.P. Biswas, Design of improved password authentication a...
Update-Optimal Authenticated Structures Based on Lattices
Authenticated data structures lattice-based cryptography
2010/3/16
We study the problem of authenticating an n-index dynamic table in the authenticated data structures model, which is related to memory checking. We present the first lattice-based authenticated struct...