搜索结果: 1-15 共查到“secure key”相关记录24条 . 查询时间(0.187 秒)
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Post-quantum cryptosystems Isogeny-based cryptosystems CSIDH
2019/9/17
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Tight security quantum chosen-ciphertext security post-quantum cryptography
2018/11/16
This paper shows the security against quantum chosen-ciphertext attacks (QCCA security) of the KEM in Saito, Yamakawa, and Xagawa (EUROCRYPT 2018) in the QROM. The proof is very similar to that for th...
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Tight security chosen-ciphertext security post-quantum cryptography
2017/10/16
We give a first tight security reduction for a conversion from a weakly secure public-key encryption scheme to an IND-CCA-secure key-encapsulation mechanism scheme in the quantum random oracle model. ...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticated key exchange protocol from a two-move passively secure unauthenticated key agreement scheme (such...
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE
key exchange lattice-based cryptography LWE
2016/6/29
Lattice-based cryptography offers some of the most attractive primitives believed to be resistant to quantum computers. Following increasing interest from both companies and government agencies in bui...
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Department of Computer Engineering,University of Peradeniya
2016/1/26
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simpl...
A Provable Security Analysis of Intel's Secure Key RNG
random number generator entropy extraction provable security
2016/1/8
We provide the first provable-security analysis of the Intel Secure Key hardware RNG
(ISK-RNG), versions of which have appeared in Intel processors since late 2011. To model the ISKRNG,
we generaliz...
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
key exchange protocols side-channel attacks leakage-resilience
2015/12/31
Security models for two-party authenticated key exchange (AKE) protocols have developed over
time to capture the security of AKE protocols even when the adversary learns certain secret values.
Incre...
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
circular security fully homomorphic encryption LWE problem
2015/12/30
Fully homomorphic encryption (FHE) has important applications in cloud computing. However, almost all fully
homomorphic encryption schemes share two common flaws that they all use large-scale secret ...
Secure Key Exchange Protocol based on Virtual Proof of Reality
Key exchange Virtual Proof PUF
2015/12/30
Securely sharing the same secret key among multiple parties is the main concern in symmetric cryptography that is the workhorse of modern cryptography due to its simplicity and fast speed. Typically a...
PUF-based key generators have been widely considered as a
root-of-trust in digital systems. They typically require an error-correcting
mechanism (e.g. based on the code-offset method) for dealing wi...
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management
Physical Unclonable Function Key Management Forward Security
2015/12/21
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management.
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
Cryptanalysis Cryptographic Authentication Network Security
2014/3/6
In 2012, Alagheband and Aref presented a dynamic and secure key manage ment model for hierarchical heterogeneous sensor networks. They proposed a signcryption algorithm which is the main building bloc...
Secure Key Exchange and Sessions Without Credentials
Key Exchange Secure sessions Credential-free
2014/3/6
Secure communication is a fundamental cryptographic primitive. Typically, security is achieved by relying on an existing credential infrastructure, such as a PKI or passwords, for identifying the end ...
We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle....