Results 1 to 10 of about 956 (257)

Provable Secure Delegation Computing Protocol Based on Privacy Protection [PDF]

open access: yesJisuanji gongcheng, 2021
Cloud-based delegation computing services can provide tremendous savings in time and computation costs for the delegate,but their privacy and provable security problems remain challenging.This paper combines fully homomorphic encryption and multi-linear ...
LI Qiuxian, ZHOU Quanxing, WANG Zhenlong, DING Hongfa, PAN Qixin
doaj   +1 more source

Generalized Feistel Structures Based on Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2022
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseudorandom functions (PRFs). Coron et al. at TCC 2010 instantiated a Feistel structure with a tweakable block cipher (TBC), and presented its provable ...
Kazuki Nakaya, Tetsu Iwata
doaj   +1 more source

Provable Security of SP Networks with Partial Non-Linear Layers

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES 2013; LowMC, EUROCRYPT 2015; HADES, EUROCRYPT 2020; MALICIOUS, CRYPTO 2020), we study their underlying structure partial SPNs, i.e., Substitution ...
Chun Guo   +4 more
doaj   +1 more source

Provably secure social network privacy-preserving scheme

open access: yes网络与信息安全学报, 2016
A provable secure social network privacy-preserving scheme was proposed to solve the problem of social network privacy-preserving scheme's security proof.Firstly,through analyzing the security requirements about the node's privacy (indistinguishable node
Jian-qiong HE,You-liang TIAN, Kai ZHOU
doaj   +3 more sources

Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Recent works of Cogliati et al. (CRYPTO 2018) have initiated provable treatments of Substitution-Permutation Networks (SPNs), one of the most popular approach to construct modern blockciphers.
Yuan Gao   +4 more
doaj   +1 more source

On one Block Cipher Mode of Operation Used to Protect Data on Block-Oriented Storage Devices

open access: yesСовременные информационные технологии и IT-образование, 2022
This research purpose is to develop a reduction-based method for analysis of cryptographic properties of block cipher modes of operation in context of full disk encryption (FDE) via provable security technique, to study weaknesses of widely spread among ...
Georgii Firsov, Alisa Koreneva
doaj   +1 more source

Short Proxy Signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2017
In order to avoid network congestion,and reduce the data flow,based on bilinear mapping,this paper proposes short proxy signature scheme with only one group element,including the signature definition,the construction of new scheme and the security ...
HUANG Rufen,HUANG Zhenjie,CHEN Qunshan,NONG Qiang
doaj   +1 more source

Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik’s Cubes

open access: yesIEEE Access, 2020
Recently, new paradigms for designing modern cryptographic schemes were proposed based on Rubik's rotations. However, most of them lack rigorous provable security reductions.
Ping Pan   +3 more
doaj   +1 more source

Provably Secure Steganography [PDF]

open access: yesIEEE Transactions on Computers, 2002
Informally, steganography is the process of sending a secret message from Alice to Bob in such a way that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In this work, we initiate the study of steganography from a complexity-theoretic point of view.
Nicholas Hopper   +2 more
openaire   +2 more sources

A Provable Secure Session Key Distribution Protocol Based on NSSK for In-Vehicle CAN Network

open access: yesMathematics, 2022
Many CAN-based session key sharing approaches are based on the group key scheme, which can easily lead advanced adversaries to infiltrate all ECUs (electronic control units) in the network if the sharing key is leaked.
Long Yin, Jian Xu, Zihao Wang, Chen Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy