搜索结果: 1-12 共查到“军事学 predicates”相关记录12条 . 查询时间(0.484 秒)
Function Private Predicate Encryption for Low Min-Entropy Predicates
public-key cryptography ZIPE
2019/1/4
In this work, we propose new predicate encryption schemes for zero inner-product encryption (ZIPE) and non-zero inner-product encryption (NIPE) predicates from prime-order bilinear pairings, which are...
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications
Predicates verifiable random functions predicate encryption schemes
2017/8/29
Predicates are used in cryptography as a fundamental tool to control the disclosure of secrets. However, how to embed a particular predicate into a cryptographic primitive is usually not given much at...
Indistinguishable Predicates: A New Tool for Obfuscation
program obfuscation indistinguishable/opaque predicates
2017/8/22
Opaque predicates are a commonly used technique in program obfuscation, intended to add complexity to control flow and to insert dummy code or watermarks. We survey a number of methods to remove opaqu...
Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures
secondary-key public-key cryptography
2016/5/24
We propose a concrete procedure of a \Sgm-protocol to prove knowledge that satisfies a monotone predicate. Inspired by the high-level proposal by Cramer, Damg\r{a}rd and Schoenmakers at CRYPTO '94, we...
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
Attribute-based encryption Attribute-based signature Attribute-based signcryption
2015/12/29
An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption
(ABE) and Attribute-Based Signature (ABS), where we have the message confidentiality and authenticity
toge...
Computing on Authenticated Data for Adjustable Predicates
public-key cryptography Signatures homomorphic redactable predicate
2013/4/18
The notion of P-homomorphic signatures, introduced by Ahn et al. (TCC 2012), generalizes various approaches for public computations on authenticated data. For a given predicate P anyone can derive a s...
Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields
Hardcore Bits Diffie-Hellman Problem Finite Fields Elliptic Curves
2013/4/18
A long-standing open problem in cryptography is proving the existence of (deterministic) hard-core predicates for the Diffie-Hellman problem defined over finite fields. In this paper we make progress ...
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
attribute-based signatures multi-authority system non-monotone predicates
2012/6/14
This paper presents a fully secure (adaptive-predicate unforgeable and private) attribute-based signature (ABS) scheme in the standard model. The security of the proposed ABS scheme is proven under st...
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
An extended abstract was presented at Public Key Cryptography -- PKC 2011 LNCS 6571 pages 35-52. This is the full paper.
2012/3/20
This paper presents a fully secure (adaptive-predicate unforgeable and private) attribute-based signature (ABS) scheme in the standard model. The security of the proposed ABS scheme is proven under st...
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
attribute-based signatures multi-authority system non-monotone predicates
2012/8/28
This paper presents a fully secure (adaptive-predicate unforgeable and private) attribute-based signature (ABS) scheme in the standard model. The security of the proposed ABS scheme is proven under st...
Functional Encryption for Inner Product Predicates from Learning with Errors
Public-key cryptography / predicate encryption functional encryption lattices learning with errors
2012/3/27
We propose a lattice-based functional encryption scheme for inner product predicates whose security follows from the difficulty of the "learning with errors" (LWE) problem. This construction allows us...
Fully Secure (Hierarchical) Predicate Encryption for All Predicates
predicate encryption HVE Hierarchical HVE CNF full security pairing-based cryptography
2010/9/21
Predicate encryption is an important cryptographic primitive that has found wide applications as it allows for fine-grained key management. In a predicate encryption scheme, the owner of the master se...