نتایج جستجو برای: continuous non malleability

تعداد نتایج: 1546963  

Journal: :IACR Cryptology ePrint Archive 2010
Andrew Chi-Chih Yao Moti Yung Yunlei Zhao

Concurrent non-malleability (CNM) is central for cryptographic protocols running concurrently in environments such as the Internet. In this work, we formulate CNM in the bare public-key (BPK) model, and show that round-efficient concurrent non-malleable cryptography with full adaptive input selection can be established, in general, with bare public-keys (where, in particular, no trusted assumpt...

Journal: :Concurrency and Computation: Practice and Experience 2009
Kaoutar El Maghraoui Travis J. Desell Boleslaw K. Szymanski Carlos A. Varela

Malleability enables a parallel application’s execution system to split or merge processes modifying granularity. While process migration is widely used to adapt applications to dynamic execution environments, it is limited by the granularity of the application’s processes. Malleability empowers process migration by allowing the application’s processes to expand or shrink following the availabi...

Journal: :Gold Bulletin 1977

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2014
Shashank Agrawal Divya Gupta Hemanta K. Maji Omkant Pandey Manoj Prabhakaran

The notion of non-malleable codes was introduced as a relaxation of standard error-correction and error-detection. Informally, a code is non-malleable if the message contained in a modified codeword is either the original message, or a completely unrelated value. In the information theoretic setting, although existence of such codes for various rich classes of tampering functions is known, expl...

2002
Boaz Barak

We construct the first constant-round non-malleable commitment scheme and the first constantround non-malleable zero-knowledge argument system, as defined by Dolev, Dwork and Naor. Previous constructions either used a non-constant number of rounds, or were only secure under stronger setup assumptions. An example of such an assumption is the shared random string model where we assume all parties...

2012
Sebastian Faust Markulf Kohlweiss Giorgia Azzurra Marson Daniele Venturi

The Fiat-Shamir transform is a well studied paradigm for removing interaction from publiccoin protocols. We investigate whether the resulting non-interactive zero-knowledge (NIZK) proof systems also exhibit non-malleability properties that have up to now only been studied for NIZK proof systems in the common reference string model: first, we formally define simulation soundness and a weak form ...

2006
Cynthia Dwork Moni Naor

In their seminal and beautiful paper Probabilistic Encryption, Goldwasser and Micali laid the theoretical groundwork for modern cryptography, both giving a clean definition of secrecy in a complexity-theoretic framework, and providing a candidate public-key cryptosystem generator that, under prevailing computational assumptions, satisfies that definition. For the case of a passive eavesdropper ...

Journal: :Applied sciences 2022

Maintaining a high rate of productivity, in terms completed jobs per unit time, High-Performance Computing (HPC) facilities is cornerstone the next generation exascale supercomputers. Process malleability presented as straightforward mechanism to address that issue. Nowadays, vast majority HPC are intended for distributed-memory applications based on Message Passing (MP) paradigm. For this reas...

2013
Sherman S. M. Chow Matthew K. Franklin Haibin Zhang

We reformalize and recast dual-receiver encryption (DRE) proposed in CCS ’04, a public-key encryption (PKE) scheme for encrypting to two independent recipients in one shot. We start by defining the crucial soundness property for DRE, which ensures that two recipients will get the same decryption result. While conceptually simple, DRE with soundness turns out to be a powerful primitive for vario...

2014
Christian Decker Roger Wattenhofer

In Bitcoin, transaction malleability describes the fact that the signatures that prove the ownership of bitcoins being transferred in a transaction do not provide any integrity guarantee for the signatures themselves. This allows an attacker to mount a malleability attack in which it intercepts, modifies, and rebroadcasts a transaction, causing the transaction issuer to believe that the origina...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید