搜索结果: 1-12 共查到“军事学 Backward”相关记录12条 . 查询时间(0.14 秒)
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Dynamic Searchable Symmetric Encryption Forward Privacy Backward Privacy
2019/9/19
Dynamic Searchable Symmetric Encryption (DSSE) enables a client to perform updates and searches on encrypted data which makes it very useful in practice. To protect DSSE from the leakage of updates (l...
Forward and Backward-Secure Range-Searchable Symmetric Encryption
dynamic symmetric searchable encryption range query forward security
2019/5/21
Dynamic searchable symmetric encryption (DSSE) allows a client to search or update over an outsourced encrypted database. Range query is commonly needed (AsiaCrypt'18) but order-preserving encryption ...
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Dynamic Searchable Symmetric Encryption Backward Privacy Forward Privacy
2019/5/9
Dynamic Searchable Symmetric Encryption (DSSEDSSE), apart from providing support for search operation, allows a client to perform update operations on outsourced database efficiently. Two security pro...
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Dynamic searchable symmetric encryption forward security backward security
2018/6/27
Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic tool in the encrypted cloud storage. However, it has been reported that DSSE usually suffers from the file-injection attacks an...
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
symmetric searchable encryption provable security implementation
2017/8/29
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can still be searched and...
Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove
ABCs electronic authentication backward unlinkable revocation pairings
2016/3/1
FIDO, German e-ID, Idemix and U-Prove constitute privacyenhanced
public-key infrastructures allowing users to authenticate in an
anonymous way. This however hampers timely revocation in a privacy
f...
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management
Physical Unclonable Function Key Management Forward Security
2015/12/21
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management.
Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check
group signatures verier-local revocation backward unlinkability
2011/7/25
Verifier-Local Revocation (VLR) group signatures, introduced by Boneh and Shacham in 2004 are a particular case of dynamic group signature schemes where the revocation process does not influence the a...
Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check
cryptographic protocols / group signatures verifier-local revocation backward unlinkability efficiency revocation check
2012/3/27
Verifier-Local Revocation (VLR) group signatures, introduced by Boneh and Shacham in 2004 are a particular case of dynamic group signature schemes where the revocation process does not influence the a...
How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG
RFID Identification Schemes Robust PRBG
2009/6/4
In this paper, we analyze an RFID identification scheme which is designed to provide forward
untraceability and backward untraceability. We show that if a standard cryptographic
pseudorandom bit gen...
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability
Digital Signature Group Signature Membership Revocation Verifier Local Revocation Trusted Computing
2008/11/6
Group signatures are generalized credential/member authentication schemes with wide ap-
plications, such as Trust Computing. Membership revocation problem is a major issue of group
signatures. In so...
A Forward-Secure Signature with Backward-Secure Detection
Forward-Secure Backward-Secure Digital signatures GQ signatures
2008/8/19
This paper enhances the security of Abdalla and Reyzin’s forwardsecure
signature scheme with backward-secure detection. In the proposed
scheme, we embeded the hash-chain into the forward-secure sign...