搜索结果: 1-15 共查到“Security Notions”相关记录25条 . 查询时间(0.062 秒)
Information ratio of an access structure is an important measure for efficiency of the best secret sharing scheme realizing it. The most common notion of secret sharing security is that of total (perf...
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
Signal protocol double ratcheting secure messaging
2018/11/2
Signal is a famous secure messaging protocol used by billions of people, by virtue of many secure text messaging applications including Signal itself, WhatsApp, Facebook Messenger, Skype, and Google A...
This paper revisits the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition to ensure security in the presence of glitches. This single...
Security notions for cloud storage and deduplication
storage systems generic cryptographic components
2017/12/19
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, but it is not obvious what precise sec...
Improved Security Notions for Proxy Re-Encryption to Enforce Access Control
Proxy re-encryption applied cryptography unidirectional
2017/9/1
Proxy Re-Encryption (PRE) allows a ciphertext encrypted under Alice's public key to be transformed to an encryption under Bob's public key without revealing either the plaintext or the decryption keys...
New security notions and feasibility results for authentication of quantum data
Quantum message authentication Wegman-Carter authentication scheme Unitary designs
2017/6/9
We give a new class of security definitions for authentication in the quantum setting. These definitions capture and strengthen existing definitions of security against quantum adversaries for both cl...
Security Notions for Bidirectional Channels
cryptographic channels bidirectional communication security models
2017/2/24
This paper closes a definitional gap in the context of modeling cryptographic two-party channels. We note that, while most security models for channels consider exclusively unidirectional communicatio...
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
Black-box separations circular security
2017/2/21
We address the problems of whether t-circular-secure encryption can be based on (t-1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based...
On the Security Notions for Homomorphic Signatures
Digital Signatures Homomorphic Signatures Security Notions
2017/1/3
Homomorphic signature schemes allow anyone to perform computation on signed data in such a way that the correctness of computation’s results is publicly certified. In this work we analyze the security...
Unifying Security Notions of Functional Encryption
Functional Encryption IND-based security generic transforms
2016/5/30
The indistinguishability (\IND) based security notion of \FE can be parameterized based on whether the adversary obtains bounded/unbounded number of challenge ciphertexts, whether she is allowed to qu...
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Attribute-based signatures security definitions traceability
2016/1/23
In this work, we revisit the notion of Decentralized Traceable Attribute-Based Signatures (DTABS) introduced by El Kaafarani et al. (CT-RSA 2014) and improve the state-of-the-art in three dimensions:...
White-Box Security Notions for Symmetric Encryption Schemes
White-Box Cryptography Security Notions
2014/3/10
White-box cryptography has attracted a growing interest from researchers in the last decade. Several white-box implementations of standard block-ciphers (DES, AES) have been proposed but they have all...
A draft call for the CAESAR authenticated-encryption competition adopts an interface that is not aligned with existing definitions in the literature. It is the purpose of this brief note to formalize ...
Cryptographic Hash Functions: Recent Design Trends and Security Notions
Hash Functions Design Compression Function Security Notions Survey
2012/3/23
Recent years have witnessed an exceptional research interest in cryptographic hash functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the U.S. National Institute o...
On the (Non-) Equivalence of UC Security Notions
weak security 1-bit specialized simulator UC security time-lock puzzles game theory
2012/3/27
In this work we investigate the relations among various security notions and show their connection with the game-theoretic notion of strong universal implementation. More precisely, we present a separ...