Results 1 to 10 of about 1,527 (301)

MRCC: A Practical Covert Channel Over Monero With Provable Security [PDF]

open access: goldIEEE Access, 2021
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent need
Zhaozhong Guo   +3 more
doaj   +2 more sources

Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks [PDF]

open access: goldInternational Journal of Distributed Sensor Networks, 2018
In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in
Lanjun Dang   +6 more
doaj   +2 more sources

Provable Security of Networks [PDF]

open access: green, 2013
arXiv admin note: text overlap with arXiv:1310.8038, arXiv:1310 ...
Angsheng Li, Yicheng Pan, Wei Zhang
openalex   +3 more sources

Provable Security for Cryptocurrencies

open access: green, 2016
The past several years have seen the surprising and rapid rise of Bitcoin and other “cryptocurrencies.” These are decentralized peer-to-peer networks that allow users to transmit money, tocompose financial instruments, and to enforce contracts between mutually distrusting peers, andthat show great promise as a foundation for financial infrastructure ...
Andrew Miller
openalex   +3 more sources

Provable and Practical Security [PDF]

open access: bronze
International Conference on Provable and Practical Security 2024 Gold Coast, Queensland   +4 more
  +5 more sources

Provable Secure Delegation Computing Protocol Based on Privacy Protection [PDF]

open access: yesJisuanji gongcheng, 2021
Cloud-based delegation computing services can provide tremendous savings in time and computation costs for the delegate,but their privacy and provable security problems remain challenging.This paper combines fully homomorphic encryption and multi-linear ...
LI Qiuxian, ZHOU Quanxing, WANG Zhenlong, DING Hongfa, PAN Qixin
doaj   +1 more source

Generalized Feistel Structures Based on Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2022
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseudorandom functions (PRFs). Coron et al. at TCC 2010 instantiated a Feistel structure with a tweakable block cipher (TBC), and presented its provable ...
Kazuki Nakaya, Tetsu Iwata
doaj   +1 more source

Provable Security of SP Networks with Partial Non-Linear Layers

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES 2013; LowMC, EUROCRYPT 2015; HADES, EUROCRYPT 2020; MALICIOUS, CRYPTO 2020), we study their underlying structure partial SPNs, i.e., Substitution ...
Chun Guo   +4 more
doaj   +1 more source

Provably secure social network privacy-preserving scheme

open access: yes网络与信息安全学报, 2016
A provable secure social network privacy-preserving scheme was proposed to solve the problem of social network privacy-preserving scheme's security proof.Firstly,through analyzing the security requirements about the node's privacy (indistinguishable node
Jian-qiong HE, You-liang TIAN, Kai ZHOU
doaj   +3 more sources

Home - About - Disclaimer - Privacy