搜索结果: 1-15 共查到“军队指挥学 public-key encryption scheme”相关记录16条 . 查询时间(0.203 秒)
Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017
Public-Key Encryption Indeterminate Equations Cryptosystem Post-quantum cryptography
2017/12/25
Abstract. We investigate the security of a public-key encryption scheme, the Indeterminate Equation Cryptosystem (IEC), introduced by Akiyama, Goto, Okumura, Takagi, Nuida, and Hanaoka at SAC 2017 as ...
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus)
Public-key Cryptosystem Post-Quantum Cryptosystem Indeterminate Equation
2017/12/25
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a problem arising from a multivariate non-linear indeterminate equation. The security of lattice cryptos...
Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes
public-key cryptography code based public key encryption
2017/3/2
Recently, Wang (2016) introduced a random linear code based quantum resistant public encryption scheme RLCE which is a variant of McEliece encryption scheme. In this paper, we introduce a revised vers...
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Department of Computer Engineering,University of Peradeniya
2016/1/26
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simpl...
Random Linear Code Based Public Key Encryption Scheme RLCE
Random linear codes McEliece Encryption scheme secure public key encryption scheme
2015/12/31
Lattice based encryption schemes and linear code based encryption schemes have received extensive
attention in recent years since they have been considered as post-quantum candidate encryption scheme...
Efficient CCA-secure Threshold Public-Key Encryption Scheme
Chosen-ciphertext security Hashed Diffie-Hellman assumption
2014/3/6
In threshold public-key encryption, the decryption key is divided into n shares, each one of which is given to a different decryption user in order to avoid single points of failure. In this study, we...
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
cryptanalysis lattice techniques
2014/3/11
In this paper, we investigate the security of a public-key encryption scheme introduced by Huang, Liu and Yang (HLY) at PKC’12. This new scheme can be provably reduced to the hardness of solving a set...
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
CCA2 Secure Public Key Encryption Scheme McEliece Assumptions Standard Model
2009/6/9
We show that a recently proposed construction by Rosen and Segev can be
used for obtaining the first public key encryption scheme based on the McEliece
assumptions which is secure against adaptive c...
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
public key encryption scheme plaintext ciphertext attacks
2009/6/9
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding
open problem of "circular encryption," by presenting a public key encryption scheme
and proving that it...
A Forward-Secure Public-Key Encryption Scheme
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem
Cryptanalysis Augot and Finiasz cryptosystem Polynomial Reconstruction Problem
2009/4/10
At Eurocrypt 2003, Augot and Finiasz proposed a new public-key encryp-
tion scheme based on the polynomial reconstruction problem [1]. The scheme was subse-
quently broken in [5], who showed that gi...
A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack
Decisional Diffie-Hellman assumption elliptic curve standard intractability paradigm
2009/4/9
We study elliptic curve cryptosystems by first investigating
the schemes defined over Zp and show that the scheme is provably secure
against adaptive chosen cipher-text attack under the decisional D...
A Forward-Secure Public-Key Encryption Scheme
Bilinear Diffe-Hellman Encryption Binary-tree encryption
2009/4/9
Cryptographic computations are often carried out on insecure devices for which the threat
of key exposure represents a serious and realistic concern. In an eort to mitigate the damage
caused by exp...
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
public-key encryption scheme polynomial reconstruction problem
2009/4/8
We describe a cryptanalysis of a public-key encryption scheme based on the
polynomial reconstruction problem . Given the public-key and a ciphertext, we recover
the corresponding plaintext in polyno...
An Authenticated Certificateless Public Key Encryption Scheme
Authenticated Public Key Encryption confidentiality
2009/3/27
An Authenticated Certificateless Public Key Encryption Scheme.