نتایج جستجو برای: continuous non malleability

تعداد نتایج: 1546963  

2006
Douglas Wikström

Consider an electronic election scheme implemented using a mix-net; a large number of voters submit their votes and then a smaller number of servers compute the result. The mix-net accepts an encrypted vote from each voter and outputs the set of votes in sorted order without revealing the permutation used. To ensure a fair election, the votes of corrupt voters should be independent of the votes...

Journal: :THEORIA. An International Journal for Theory, History and Foundations of Science 2020

Journal: :Applied Cognitive Psychology 2021

We examined the incidence of recovered memories child abuse in a large French general public sample (N = 3346). Of 905 (27% total sample) who reported having abuse, 211 (23%) that they had no previous memory of, with 82 these (9% 905) reporting did not know were abused beforehand. Ninety percent latter their when therapy at time. Those outside often discussions peers and/or media exposure relat...

1999
Amit Sahai

We introduce the notion of non-malleable noninteractive zero-knowledge (NIZK) proof systems. We show how to transform any ordinary NIZK proof system into one that has strong non-malleability properties. We then show that the elegant encryption scheme of Naor and Yung [NY] can be made secure against the strongest form of chosen-ciphertext attack by using a non-malleable NIZK proof instead of a s...

Journal: :IACR Cryptology ePrint Archive 2009
Seiko Arita

It is known that composable secure commitments, that is, concurrent non-malleable commitments exist in the plain model, based only on standard assumptions such as the existence of claw-free permutations or even one-way functions. Since being based on the plain model, the deniability of them is trivially satisfied, and especially the latter scheme satisfies also adaptivity, hence it is adaptived...

Journal: :IACR Cryptology ePrint Archive 2013
Michael Backes Sebastian Meiser Dominique Schröder

Delegation of signing rights is a central problem in security. Whereas delegating by givingpower of attorney is well studied and digitally realized via delegatable anonymous credentials,directly delegating signing possibilities without the need for an external logic, can be done viamalleable signature schemes. However, the existing schemes do not allow for privacy preserving,fin...

2017
Sebastian Faust Kristina Hostáková Pratyay Mukherjee Daniele Venturi

Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010— are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t. some class of tampering adversaries, result in a decoded value that is either identical or unrelated to the original message. Such codes are very useful for protecting arbitrary cryptographic primitives against tampering a...

Journal: :Journal of Computing Science and Engineering 2012

Journal: :Theor. Comput. Sci. 2005
Jonathan Herzog

The Dolev-Yao model is a simple and useful framework in which to analyze security protocols, but it assumes that the adversary is extremely limited. We show that it is possible for the results of this model to remain valid even if the adversary is given additional power. In particular, we show that there exist situations in which Dolev-Yao adversary can be viewed as a valid abstraction of all r...

2013
Dana Dachman-Soled Tal Malkin Mariana Raykova Muthuramakrishnan Venkitasubramaniam

We present a unified approach for obtaining general secure computation that achieves adaptive-Universally Composable (UC)-security. Using our approach we essentially obtain all previous results on adaptive concurrent secure computation, both in relaxed models (e.g., quasi-polynomial time simulation), as well as trusted setup models (e.g., the CRS model, the imperfect CRS model). This provides c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید