搜索结果: 1-15 共查到“军事学 KDM”相关记录15条 . 查询时间(0.078 秒)
Simple and Efficient KDM-CCA Secure Public Key Encryption
key dependent message security chosen ciphertext security
2019/9/16
We propose two efficient public key encryption (PKE) schemes satisfying key dependent message security against chosen ciphertext attacks (KDM-CCA security). The first one is KDM-CCA secure with respec...
Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security
LWE standard model Naor-Yung
2019/8/8
The Naor-Yung paradigm is a well-known technique that constructs IND-CCA2-secure encryption schemes by means of non-interactive zero-knowledge proofs satisfying a notion of simulation-soundness. Until...
CPA-to-CCA Transformation for KDM Security
public-key encryption key-dependent message security chosen ciphertext security
2019/6/3
We show that chosen plaintext attacks (CPA) security is equivalent to chosen ciphertext attacks (CCA) security for key-dependent message (KDM) security. Concretely, we show how to construct a public-k...
In this note, we show that a strong notion of KDM security cannot be obtained by any encryption scheme in the auxiliary input setting, assuming Learning With Errors (LWE) and one-way permutations. The...
A Framework for Achieving KDM-CCA Secure Public-Key Encryption
key dependent message security chosen ciphertext security projective hash function
2018/11/16
We propose a framework for achieving a public-key encryption (PKE) scheme that satisfies key dependent message security against chosen ciphertext attacks (KDM-CCA security) based on projective hash fu...
A hash function family is called correlation intractable if for all sparse relations, it is hard to find, given a random function from the family, an input-output pair that satisfies the relation (Can...
KDM-Secure Public-Key Encryption from Constant-Noise LPN
learning parity with noise key-dependent message security public-key encryption
2017/4/12
The Learning Parity with Noise (LPN) problem has found many applications in cryptography due to its conjectured post-quantum hardness and simple algebraic structure. Over the years, constructions of d...
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
public-key encryption key-dependent messages chosen-ciphertext security
2016/12/10
KDM[F][F]-CCA secure public-key encryption (PKE) protects the security of message f(sk)f(sk), with f∈Ff∈F, that is computed directly from the secret key, even if the adversary has access to a decrypti...
KDM Security for Identity-Based Encryption: Constructions and Separations
KDM security IBE IB-HPS
2016/12/8
For encryption schemes, key dependent message (KDM) security requires that ciphertexts preserve secrecy even when the encrypt messages may depend on the secret keys. While KDM security has been extens...
Bounded KDM Security from iO and OWF
obfuscation KDM security key dependent message security
2016/7/13
To date, all constructions in the standard model (i.e., without random oracles) of Bounded Key-Dependent Message (KDM) secure (or even just circularly-secure) encryption schemes rely on specific assum...
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
Low Noise LPN Key Dependent Message Security LPN Hardness Reduction
2016/1/5
Cryptographic schemes based on the Learning Parity with Noise (LPN) problem have several
very desirable aspects: Low computational overhead, simple implementation and conjectured
post-quantum hardne...
KDM-Security via Homomorphic Smooth Projective Hashing
public-key cryptography Homomorphic Smooth Projective Hashing
2015/12/24
We present new frameworks for constructing public-key encryption schemes satisfying key-dependent
message (KDM) security and that yield efficient, universally composable oblivious transfer (OT) proto...
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Signatures Related-Key attack
2014/3/12
This paper introduces key-versatile signatures. Key-versatile signatures allow us to sign with keys already in use for another purpose, without changing the keys and without impacting the security of ...
RKA-KDM secure encryption from public-key encryption
related key attacks key-dependent message security garbled circuits
2014/3/7
We construct secret-key encryption (SKE) schemes that are secure against related-key attacks and in the presence of key-dependent messages (RKA-KDM secure). We emphasize that RKA-KDM security is not m...
We study the natural question of how well suited the hybrid encryption paradigm is in the context of key-dependent message (KDM) attacks. We prove that if a key derivation function (KDF) is used in be...