搜索结果: 1-6 共查到“军事学 deniability”相关记录6条 . 查询时间(0.062 秒)
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
secure messaging mobile messaging
2018/11/16
In this paper, we describe Mobile CoWPI, a deployable, end-to-end secure mobile group messaging application with proofs of security. Mobile CoWPI allows dynamic groups of users to participate in, join...
Deniable messaging protocols allow two parties to have `off-the-record' conversations without leaving any record that can convince external verifiers about what either of them said during the conversa...
Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication
deniability anonymity anonymous authentication
2016/1/7
In the problem of anonymous authentication (Boneh et al. CCS 1999), a sender wishes
to authenticate a message to a given recipient in a way that preserves anonymity: the recipient does
not know the ...
Group Signature with Deniability: How to Disavow a Signature
group signature deniability non-interactive zero-knowledge proof
2016/1/4
Group signatures are a class of digital signatures with enhanced privacy. By using this type of
signature, a user can sign a message on behalf of a specific group without revealing his identity, but ...
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability
cryptographic protocols / Key Exchange Perfect Forward Secrecy Deniability PKI
2012/3/28
Traditionally, secure one-round key exchange protocols in the PKI setting have either achieved perfect forward secrecy, or forms of deniability, but not both. On the one hand, achieving perfect forwar...
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability
cryptographic protocols Key Exchange Perfect Forward Secrecy
2011/7/25
Traditionally, secure one-round key exchange protocols in the PKI setting have either achieved perfect forward secrecy, or forms of deniability, but not both.