搜索结果: 1-6 共查到“军事学 S-box construction”相关记录6条 . 查询时间(0.146 秒)
A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption
Non-Malleable Encryption Semantically Secure Encryption
2016/7/22
We show how to transform any semantically secure encryption scheme into a non-malleable one, with a black-box construction that achieves a quasi-linear blow-up in the size of the ciphertext. This impr...
Round-Efficient Black-Box Construction of Composable Multi-Party Computation
composable security CCA-secure commitment scheme
2016/1/8
We present a round-efficient black-box construction of a general MPC protocol that satisfies composability in the plain model. The security of our protocol is proven in angel-based UC framework under ...
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
sanitizable signatures privacy unlinkability
2015/12/23
Sanitizable signatures, introduced by Ateniese et al. at ESORICS’05,
allow to issue a signature on a message where certain predefined
message blocks may later be changed (sanitized) by some dedicate...
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol
composable security CCA-secure commitment
2014/3/5
We present the first general MPC protocol that satisfies the following: (1) the construction is black-box, (2) the protocol is universally composable in the plain model, and (3) the number of rounds i...
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme
plaintext aware encryption weakly simulatable public key encryption
2014/3/6
We present a construction of a CCA2-secure encryption scheme from a plaintext aware, weakly simulatable public key encryption scheme. The notion of plaintext aware, weakly simulatable public key encry...
Matrix Power S-Box Construction
symmetric cipher S-box matrix power one-way function (OWF)
2008/8/25
The new symmetric cipher S-box construction based on matrix power function is presented.
The matrix consisting of plain data bit strings is combined with three round key matrices using
arithmetical ...