Precise Cryptography
نویسندگان
چکیده
Precise zero knowledge guarantees that the view of any verifier V can be simulated in timeclosely related to the actual (as opposed to worst-case) time spent by V in the generated view.We generalize this notion in two ways:1. We provide definitions and constructions of precise encryption, precise proofs of knowledgeand precise secure computation.2. We introduce relaxed notions of precise zero knowledge—which relate the expectation(or higher moments) of the running time of the simulation with the expectation (higher-moments) of the running-time of the verifier—and provide conditions under which thesenotions are implied by the traditional (non-precise) notion of zero knowledge.
منابع مشابه
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملOn the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کاملSecurity of Quantum Cryptography with Realistic Sources
The interest in practical implementations of quantum key distribution (QKD) is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within the scenario of security against individual attacks by an eavesdropper. It illustrates previous result...
متن کاملA stability theorem for lines in Galois planes of prime order
In this paper we prove that a point set of size less than 32(q + 1) in PG(2, q), q prime, that has relatively few 0-secants must contain many collinear points. More precise bounds can be found in Theorem 2.4.
متن کاملPractical Fault-Tolerant Data Aggregation
During Financial Cryptography 2012 Chan et al. presented a novel privacy-protection fault-tolerant data aggregation protocol. Comparing to previous work, their scheme guaranteed provable privacy of individuals and could work even if some number of users refused to participate. In our paper we demonstrate that despite its merits, their method provides unacceptably low accuracy of aggregated data...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007