Filters








46,965 Hits in 9.1 sec

On the Achievability of Simulation-Based Security for Functional Encryption [chapter]

Angelo De Caro, Vincenzo Iovino, Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
(2) To what extent can we achieve a simulation-based (SIM) security notion for FE?  ...  Functional Encryption, Simulation-Based Security, Random Oracle Model. 10 We note that a couple recent works [BO12,BF12] extend the equivalence of IND and SIM for pre-image sampleable functionalities to  ...  Simulation-Based Security for Hidden Vector Encryption In the section we present a positive result for simulation-based secure functional encryption for HVE whose semantic security can be proved under  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-40084-1_29">doi:10.1007/978-3-642-40084-1_29</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vsu6xy2vvrafpkb6fgctaccmpm">fatcat:vsu6xy2vvrafpkb6fgctaccmpm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170716234529/https://eprint.iacr.org/2013/364.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4a/74/4a74da95da648e9bc405d1b9e0923eed2e83ad52.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-40084-1_29"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Functional Encryption: Definitions and Challenges [chapter]

Dan Boneh, Amit Sahai, Brent Waters
<span title="">2011</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We initiate the formal study of functional encryption by giving precise definitions of the concept and its security.  ...  We show that defining security for functional encryption is non-trivial. First, we show that a natural game-based definition is inadequate for some functionalities.  ...  The public-key encryption would need to be non-committing to achieve the simulation-based definition of security for the good case.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-19571-6_16">doi:10.1007/978-3-642-19571-6_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/iiz6j7bhezfifglqjtwbi7rwom">fatcat:iiz6j7bhezfifglqjtwbi7rwom</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170820153053/https://link.springer.com/content/pdf/10.1007%2F978-3-642-19571-6_16.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6e/c9/6ec9b6e1c53d134b1cb70f4693c8c31207f62ae1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-19571-6_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Practical Order-Revealing Encryption with Limited Leakage [chapter]

Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We present the first efficient order-revealing encryption scheme which achieves a simulation-based security notion with respect to a leakage function that precisely quantifies what is leaked by the scheme  ...  (Eurocrypt 2015) introduced a generalization of order-preserving encryption, called order-revealing encryption, and presented a construction which achieves this notion with best-possible security.  ...  Acknowledgments We would like to thank Sam Kim for helpful discussions about ORE, and Adam O'Neill for useful insights in shrinking the ciphertext size of our main construction.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-52993-5_24">doi:10.1007/978-3-662-52993-5_24</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wnjz4umcovbn3ljeo7luzbwrja">fatcat:wnjz4umcovbn3ljeo7luzbwrja</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160311044252/https://crypto.stanford.edu/~dwu4/papers/PracticalORE.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9b/74/9b74010ca540dd71902c326c0cd96d2c82fadb69.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-52993-5_24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Reusable garbled circuits and succinct functional encryption

Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
<span title="">2013</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jlc5kugafjg4dl7ozagimqfcbm" style="color: black;">Proceedings of the 45th annual ACM symposium on Symposium on theory of computing - STOC &#39;13</a> </i> &nbsp;
The security of our construction is based on the intractability of the Learning with Errors (LWE) problem and holds as long as an adversary has access to a single key sk f (or even an a priori bounded  ...  We construct, for the first time, a succinct functional encryption scheme for any polynomial-time function f where succinctness means that the ciphertext size does not grow with the size of the circuit  ...  Finally, we prove security of our scheme based on Def. 3. We construct a p.p.t. simulator S that achieves Def. 3.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2488608.2488678">doi:10.1145/2488608.2488678</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/stoc/GoldwasserKPVZ13.html">dblp:conf/stoc/GoldwasserKPVZ13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/whwl6pfenzexvkgvjotuzy6uwa">fatcat:whwl6pfenzexvkgvjotuzy6uwa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20161020215050/http://people.csail.mit.edu/nickolai/papers/goldwasser-sfe.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ed/65/ed65fb50897fa9487c125e10aeebae312f80b856.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2488608.2488678"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

<span title="2021-09-30">2021</span> <i title="Korean Society for Internet Information (KSII)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hupfbobgkvepdnt5g32qxkypsy" style="color: black;">KSII Transactions on Internet and Information Systems</a> </i> &nbsp;
To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid  ...  The achieved results reveal that the proposed scheme is semantically secure in the random oracle model.  ...  time, the proposed ID-based broadcast encryption scheme for cloud network integration is IND-ID-CPA security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2021.09.015">doi:10.3837/tiis.2021.09.015</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oyg7u2l3ybeg3il466kgkoewzq">fatcat:oyg7u2l3ybeg3il466kgkoewzq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211002064153/http://itiis.org/digital-library/manuscript/file/24938/TIIS%20Vol%2015,%20No%209-15.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8b/71/8b716a4e5664edd39632e90fb09963460fa6ff5d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2021.09.015"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Functional Encryption: New Perspectives and Lower Bounds [chapter]

Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this work, we present new perspectives on security definitions for functional encryption, as well as new lower bounds on what can be achieved.  ...  They considered two security notions for functional encryption, namely: indistinguishability (IND) based security and simulation (SIM) based security.  ...  Acknowledgments We thank Shafi Goldwasser, Yael Kalai, Raluca Ada Popa and Charles Rackoff for a number of insightful conversations that helped improve the presentation of the impossibility result.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-40084-1_28">doi:10.1007/978-3-642-40084-1_28</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hla6hmlezrgaderqp2opq7rzhy">fatcat:hla6hmlezrgaderqp2opq7rzhy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20121114225728/http://eprint.iacr.org/2012/468.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/63/f0631aa81cc4fdd4c50e6d4272d35495ed6f5d7c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-40084-1_28"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Obfuscation for Cryptographic Purposes

Dennis Hofheinz, John Malone-Lee, Martijn Stam
<span title="2009-06-13">2009</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jmi32x7o5hfnpkgh2irnuqpim" style="color: black;">Journal of Cryptology</a> </i> &nbsp;
Our definitions are simulation-based (i.e., require the existence of a simulator that can efficiently generate fake obfuscations) and demand only security on average (over the choice of the obfuscated  ...  Specifically, we show that our definitions have the following properties: Usefulness: Securely obfuscating (the encryption function of) a secure private-key encryption scheme yields a secure public-key  ...  We also thank Alex Dent for motivating discussions and Salil Vadhan for pointing out the unreasonableness of verify-only secure MACs and signatures.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-009-9046-1">doi:10.1007/s00145-009-9046-1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nhusuibl5rgwbpvxeutckxh5zm">fatcat:nhusuibl5rgwbpvxeutckxh5zm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170818200708/https://infoscience.epfl.ch/record/172912/files/paper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7e/be/7ebe0d81966b9ceb57510a86266a7e106a947910.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-009-9046-1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Functional Encryption from (Small) Hardware Tokens [chapter]

Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Unfortunately, fundamental impossibility results have been demonstrated for constructing FE schemes for general functions satisfying a simulation-based definition of security.  ...  In the past few years substantial progress has been made on functional encryption and a weaker variant called predicate encryption.  ...  We would like to thank the anonymous reviewers for helpful feedback.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-42045-0_7">doi:10.1007/978-3-642-42045-0_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/odtsxwdsq5eizhy7jybjlzssr4">fatcat:odtsxwdsq5eizhy7jybjlzssr4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808041008/http://www.iis.sinica.edu.tw/~kmchung/download/token-FE.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/ad/bfad16a4c3d25e0497c78c896cc7f659bab59500.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-42045-0_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

RTL Modelling for the Cipher Blcok Chaining Mode (Cbc) for Data Security

Meenakshi R. K, A. Arivazhagan
<span title="2017-12-01">2017</span> <i title="Institute of Advanced Engineering and Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/trvfti3jm5hnxhei7rl7owpcqq" style="color: black;">Indonesian Journal of Electrical Engineering and Computer Science</a> </i> &nbsp;
In this paper, the encryption and decryption is mainly focused on the cipher block chaining (CBC) mode for achieving the high secured data transmission.  ...  Advanced encryption standard (AES) is one of the promising cryptographic algorithms for the terrestrial communication.  ...  The stream cipher algorithm based on modified AES block cipher concept to achieve high complexity in encryption and decryption processes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/ijeecs.v8.i3.pp709-711">doi:10.11591/ijeecs.v8.i3.pp709-711</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rnxqaf25azhrbpto6zl43av6i4">fatcat:rnxqaf25azhrbpto6zl43av6i4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427153940/http://www.iaescore.com/journals/index.php/IJEECS/article/download/9139/7708" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/86/59/8659f453397e83bb027ae64ac2c78b7878532027.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/ijeecs.v8.i3.pp709-711"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Enhanced secure data transfer for WSN using chaotic-based encryption

<span title="">2017</span> <i title="Mechanical Engineering Faculty in Slavonski Brod"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/t73uxenjnncj3pwpreqsfuzkyi" style="color: black;">Tehnički Vjesnik</a> </i> &nbsp;
Original scientific paper Processes on Wireless Sensor Networks (WSN) and their areas of use have become more widespread, and the issue of net-work security has appeared as one of the primary necessities  ...  In this study, a chaotic encryption system to meet the security need on WSN using chaotic systems was carried out.  ...  Figure 4 The average end to end message delay and number of nodes for the simulation model with chaotic based encryption and Skipjack algorithm Energy consumption One of the important performance metrics  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17559/tv-20150728112744">doi:10.17559/tv-20150728112744</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/prgu2q37rnaa3jmz6e5jk3ggve">fatcat:prgu2q37rnaa3jmz6e5jk3ggve</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722082210/https://hrcak.srce.hr/file/273540" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/61/99/61994cfa7b7a28ef7040fe0b7b5d9f3894b1f291.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17559/tv-20150728112744"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

On the power of rewinding simulators in functional encryption

Angelo De Caro, Vincenzo Iovino
<span title="2016-08-25">2016</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/c45m6ttnaje4xbjsq7m2c6df2a" style="color: black;">Designs, Codes and Cryptography</a> </i> &nbsp;
In a seminal work, Boneh, Sahai and Waters (BSW, for short) [TCC'11] showed that for functional encryption the indistinguishability notion of security (IND-Security) is weaker than simulation-based security  ...  Only recently, papers studying simulation-based (SIM) notions of security for functional encryption were proposed by Boneh, Sahai, and Waters [BSW11] and O'Neill [O'N10] who explored security definitions  ...  Vincenzo thanks Sadeq Dousti for useful comments and suggesting him this line of research.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10623-016-0272-x">doi:10.1007/s10623-016-0272-x</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jmmgkqtvfffk7mzxoxs5ntkj3u">fatcat:jmmgkqtvfffk7mzxoxs5ntkj3u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150318064140/http://eprint.iacr.org/2013/752.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b8/7a/b87a2268bc329ce65b9be28bfdad522e4be559ab.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10623-016-0272-x"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Full Secure Attribute-Based Broadcast Encryption Achieved through Selective Techniques

Jin SUN, Yu-pu HU
<span title="2016-12-21">2016</span> <i title="DEStech Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ugjloj4elnhchek5k3frqkmwfy" style="color: black;">DEStech Transactions on Environment Energy and Earth Science</a> </i> &nbsp;
According to the broadcast encryption scheme couldn't consider its security and efficiency in one model simultaneously, a full secure attribute-based broadcast encryption achieved through selective techniques  ...  By utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full security, it is proved by combining the dual system encryption  ...  Acknowledgements This research was supported by the National Natural Science Foundation of China under Grants 61303223 and 61173151, and the Natural Science Foundation of Shaanxi Province of China (No.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dteees/seeie2016/4528">doi:10.12783/dteees/seeie2016/4528</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pnocps3oqbcftdt5c6kkzs3qj4">fatcat:pnocps3oqbcftdt5c6kkzs3qj4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719153411/http://dpi-proceedings.com/index.php/dteees/article/download/4528/4167" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/97/b2/97b27751717329fa770a1bccaa899b7a8c331d4e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dteees/seeie2016/4528"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer [chapter]

Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The main difference between adaptive and semi-adaptive security is that semi-adaptive security allows for the case where one party starts out corrupted and the other party becomes corrupted later on, but  ...  We solve the latter problem by means of a new primitive that we call somewhat non-committing encryption resulting in significant efficiency improvements over the standard method for realizing secure channels  ...  We thank Ran Canetti, Yevgeniy Dodis, Yuval Ishai, Stas Jarecki, and Aggelos Kiayias for useful discussions. We also thank the anonymous referees for their constructive comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-03356-8_30">doi:10.1007/978-3-642-03356-8_30</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r6cuynclera67nj22acjec2n44">fatcat:r6cuynclera67nj22acjec2n44</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180727072740/https://link.springer.com/content/pdf/10.1007%2F978-3-642-03356-8_30.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f3/4b/f34b6f48af4a4af1c7c5c77bbb771ea6021d8e69.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-03356-8_30"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware [chapter]

Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this work, we show how to achieve the best of both worlds: We construct two-component OCL schemes without relying on leak-free components.  ...  Our constructions immediately yield adaptively secure and leakage tolerant MPC protocols for any no-input randomized functionality in the semi-honest model.  ...  However, standard simulation based security is not sufficient for the argument of the hardware replacement as above because the simulation (of ρ ) could be a joint simulation for both participants.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46803-6_5">doi:10.1007/978-3-662-46803-6_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/freeqcrkavguzf4xwkqu3uozjq">fatcat:freeqcrkavguzf4xwkqu3uozjq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151022135558/http://eprint.iacr.org/2014/856.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/59/26/592600847070df094550c287f38abbc571b178b3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46803-6_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Cloud-Based Data Management Security Models

Shehu Abdulwahab, Kabiru Ibrahim Musa, Ahmadu Maidorawa
<span title="2020-03-31">2020</span> <i title="International Journal of Innovative Research &amp; Development (GlobeEdu)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vklegd4usvfqdbnwe7fyxqedt4" style="color: black;">The International Journal of Science &amp; Technoledge</a> </i> &nbsp;
Sample for both simulated components results were presented in tables and graphs, and discussed based on the corresponding results.  ...  Both Conditions of low latency i.e. speed and security have been achieved by the encrypted file unlike the unencrypted file that have no security with high vulnerability of breaching data confidentiality  ...  Video.  Testing with different security threats at the time of data transfer and on the stored data for a better endorsement.  Measuring the performance of the encryption solution through various parameters  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24940/theijst/2020/v8/i3/st2003-022">doi:10.24940/theijst/2020/v8/i3/st2003-022</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ywcjo2v5r5eqrbdbvug567gke4">fatcat:ywcjo2v5r5eqrbdbvug567gke4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201103182131/http://www.internationaljournalcorner.com/index.php/theijst/article/download/151929/105801" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/c1/f4c14a300b75bd83b47dc4c48f38165daff92e7e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24940/theijst/2020/v8/i3/st2003-022"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 46,965 results