搜索结果: 1-15 共查到“军事学 Provably secure”相关记录106条 . 查询时间(0.062 秒)
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
proof-of-stake secure initialization uniqueness
2019/5/13
We present "UniqueChain", a proof-of-stake based blockchain protocol that achieves secure initialization of newly joining parties without any additional trusted assumptions and fast messages (transact...
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes
secret-key cryptography MERS
2019/4/23
This paper presents a novel, yet efficient secret-key authentication and MAC, which provide post-quantum security promise, whose security is reduced to the quantum-safe conjectured hardness of Mersenn...
Implementation-Level Corruptions in Distance Bounding -- Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass --
cryptographic protocols white-box
2019/1/2
In relay attacks,a man-in-the-middle attacker gains access to a service by relaying the messages between two legitimate parties. Distance-bounding protocols are a countermeasure to relay attacks, wher...
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
Proxy Re-Encryption Random Oracle Model Chosen Ciphertext Security
2018/11/29
Proxy re-encryption (PRE) enables delegation of decryption rights by entrusting a proxy server with special information, that allows it to transform a ciphertext under one public key into a ciphertext...
Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments
Certificateless cryptography Signature Bilinear pairing
2018/11/20
Recently, Karati et al. presented a lightweight certificateless signature scheme for industrial Internet of Things (IIoT) environments, and claimed the scheme was provably secure in the standard model...
P4TC---Provably-Secure yet Practical Privacy-Preserving Toll Collection
Toll Collection Location Privacy Provable Security
2018/11/20
Electronic toll collection (ETC) is widely used all over the world not only to finance our road infrastructures, but also to realize advanced features like congestion management and pollution reductio...
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction
AMS security logic locking process variations
2018/11/12
Similar to digital circuits, analog and mixed-signal (AMS) circuits are also susceptible to supply-chain attacks such as piracy, overproduction, and Trojan insertion. However, unlike digital circuits,...
Provably Secure Integration Cryptosystem on Non-Commutative Group
Braid group Public key cryptosystem CPA
2018/5/28
Braid group is a very important non-commutative group. It is also an important tool of quantum field theory, and has good topological properties. This paper focuses on the provable security research o...
Provably secure compilation of side-channel countermeasures
constant-time secure compilation
2017/12/25
Software-based countermeasures provide effective mitigation against side-channel attacks, often with minimal efficiency and deployment overheads. Their effectiveness is often amenable to rigorous anal...
The client-server architecture is one of the most widely used in Internet for its simplicity and flexibility. In practice the server is assigned a public address so that its services can be consumed.T...
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
foundations applications implementation
2017/8/16
Using the cloud to store data offers many advantages for businesses and individuals alike. The cloud storage provider, however, has to be trusted not to inspect or even modify the data they are entrus...
Updatable Tokenization: Formal Definitions and Provably Secure Constructions
Formal Definitions Provably Secure Constructions
2017/7/24
Tokenization is the process of consistently replacing sensitive elements, such as credit cards numbers, with non-sensitive surrogate values. As tokenization is mandated for any organization storing cr...
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime
RSA key generation random oracle non-interactive proof
2017/7/6
Generic non-interactive zero-knowledge (NIZK) proofs can be used to prove such properties. However, generic NIZK proofs are not practical at all. For some very specific properties, specialized proofs ...
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
Direct Anonymous Attestation Anonymity Privacy Standards
2017/7/4
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used for the management of cryptographic keys and for remote attestation. The specification of the most r...
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
elliptic curve cryptosystem smart cards hash functions
2017/6/6
Nowadays, IT enabled service gain more attention due to easy to access resources from remote place. IT enabled services are extend their service to all kind of business and personal related applicatio...