搜索结果: 1-15 共查到“军事学 leakage”相关记录225条 . 查询时间(0.046 秒)
Sponges Resist Leakage: The Case of Authenticated Encryption
AEAD Leakage Resilience Side Channels
2019/9/17
In this work we advance the study of leakage-resilient Authenticated Encryption with Associated Data (AEAD) and lay the theoretical groundwork for building such schemes from sponges. Building on the w...
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions
public-key cryptography leakage-resilient identity-based encryption
2019/8/30
In this paper, we propose a new leakage-resilient identity-based encryption (IBE) scheme that is secure against chosen-ciphertext attacks (CCA) in the bounded memory leakage model. It is the first CCA...
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
encrypted databases leakage-abuse attack mitigation searchable encryption
2019/7/15
Building expressive encrypted databases that can scale to large volumes of data while enjoying formal security guarantees has been one of the holy grails of security and cryptography research. Searcha...
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage
Randomness leakage attacks Fiat-Shamir signature Dilithium
2019/6/19
Leakage during the signing process, including partial key exposure and partial (or complete) randomness leakage, may be devastating for the security of digital signatures. In this work, we consider th...
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
side-channel analysis leakage detection security certification
2019/6/14
An established ingredient in the security evaluation of cryptographic devices is leakage detection, whereby physically observable characteristics such as the power consumption are measured during oper...
On the Local Leakage Resilience of Linear Secret Sharing Schemes
Secret Sharing leakage resilience information theory
2019/6/5
We consider the following basic question: to what extent are standard secret sharing schemes and protocols for secure multiparty computation that build on them resilient to leakage? We focus on a simp...
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
oblivious transfer differential privacy hardness amplification
2019/6/4
Consider a PPT two-party protocol Π=(A,B)Π=(A,B) in which the parties get no private inputs and obtain outputs OA,OB∈{0,1}OA,OB∈{0,1}, and let VAVA and VBVB denote the parties' individual views. Proto...
Unconditionally Secure Computation Against Low-Complexity Leakage
Low-Complexity Leakage complexity-theoretic assumptions
2019/6/4
We consider the problem of constructing leakage-resilient circuit compilers that are secure against global leakage functions with bounded output length. By global, we mean that the leakage can depend ...
About Wave Implementation and its Leakage Immunity
preimage sampleable function hash and sign signature provable security
2019/5/23
Wave is a recent digital signature scheme. It is based on a family of trapdoor one-way Preimage Sampleable Functions and is proven EUF-CMA in the random oracle model under two code-based computational...
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
side channel leakage assessment deep learning
2019/5/21
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) due to its potential to improve the success probability or enhance the performance of certain frequent...
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
public-key encryption leakage-resilience CCA security
2019/5/21
We propose the concept of quasi-adaptive hash proof system (QAHPS), where the projection key is allowed to depend on the specific language for which hash values are computed. We formalize leakage-resi...
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Dynamic Searchable Symmetric Encryption Backward Privacy Forward Privacy
2019/5/9
Dynamic Searchable Symmetric Encryption (DSSEDSSE), apart from providing support for search operation, allows a client to perform update operations on outsourced database efficiently. Two security pro...
Full Database Reconstruction with Access and Search Pattern Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
The widespread use of cloud computing has enabled several database providers to store their data on servers in the cloud and answer queries from those servers. In order to protect the confidentiality ...
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios
identification scheme ephemeral secret setting ephemeral secret leakage
2019/4/3
In this paper we concern anonymous identification, where the verifier can check that the user belongs to a given group of users (just like in case of ring signatures), however a transcript of a sessio...
In the past 15 years, cryptography has made considerable progress in expanding the adversarial attack model to cover side-channel attacks, and has built schemes to provably defend against some of them...