• No results found

[PDF] Top 20 Functional Encryption from (Small) Hardware Tokens

Has 10000 "Functional Encryption from (Small) Hardware Tokens" found on our website. Below are the top 20 most common "Functional Encryption from (Small) Hardware Tokens".

Functional  Encryption  from (Small)  Hardware  Tokens

Functional Encryption from (Small) Hardware Tokens

... the hardware token, and digital signature is used to authenticate ...the encryption, while in solution #2, the authentication is provided by the simulation- extractability of the NIZK, and the soundness of ... See full document

13

Updatable  Functional  Encryption

Updatable Functional Encryption

... Before encryption we append to the cleartext the token-id of the first token to be issued, the address of the first position to be read and the initial state of the ...content. Tokens include the decryption ... See full document

17

Mergeable  Functional  Encryption

Mergeable Functional Encryption

... approach could to make Alice to create a new FE system and to ask the server to merge the two encrypted data under the new Alice’s public-key. This solution incurs in a lot of problems as well. First of all, it requires ... See full document

32

General  Statistically  Secure  Computation  with  Bounded-Resettable  Hardware  Tokens

General Statistically Secure Computation with Bounded-Resettable Hardware Tokens

... different from ours: They use affine functions that map length-n bit-vectors to (n × n)-matrices, whereas we use higher-degree univariate polynomials that operate on a large finite ... See full document

29

Leakage-Resilient  Circuits  Revisited --   Optimal  Number  of  Computing  Components  without  Leak-free  Hardware

Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware

... the hardware component from hardware-based constructions, when the functionality provided by the hardware satisfies some ...deniable encryption (recently constructed by Sahai and Water ... See full document

29

Weakening  the  Isolation  Assumption  of  Tamper-proof  Hardware  Tokens

Weakening the Isolation Assumption of Tamper-proof Hardware Tokens

... ideas from the previous section the parties can compute the com- mitment functionality, which can then be used to establish a common reference string between David and the ... See full document

19

Functional  Encryption  for  Regular  Languages

Functional Encryption for Regular Languages

... Designing an encryption system to support a DFA-type functionality provides a new set of challenges. It is useful to compare them to those in building a boolean formula (ABE) type system. In existing ABE systems a ... See full document

18

Upgrading  to  Functional  Encryption

Upgrading to Functional Encryption

... Remark: At first glance, there seems to be a circularity issue in trying to prove IND-CCA security of our scheme. That is, in order to prove indistinguishability of the main hybrids, we require to first erase α which ... See full document

51

Co-designed accelerator for homomorphic encryption applications

Co-designed accelerator for homomorphic encryption applications

... constructed from two parts: a dedicated hardware accelerator, and the software running on a general-purpose ...the hardware part of the accelerator can be connected to a ...between hardware ... See full document

8

Hierarchical  Functional  Encryption

Hierarchical Functional Encryption

... Proof overview. Let us focus on the case of selective security, semi-adaptive security follows by a practically identical argument. In the selective security game, the adversary first specifies challenge messages x ∗ 0 ... See full document

25

Deniable  Functional  Encryption

Deniable Functional Encryption

... Deniable encryption, first introduced by Canetti et ...of functional encryption (FE), as introduced by Boneh et ...compute from any encryption of a message x the value F (k, x) ... See full document

31

Fully  Anonymous  Attribute  Tokens  from  Lattices

Fully Anonymous Attribute Tokens from Lattices

... attribute tokens where users are issued attribute-containing credentials that they can use to anony- mously sign messages and generate tokens revealing only a subset of their ...users from framing ... See full document

25

Generic  Conversions  from  CPA  to  CCA  secure  Functional  Encryption

Generic Conversions from CPA to CCA secure Functional Encryption

... Moreover, it is said to have re-randomization property if for all x ∈ X , x x. For many practical reason, Alice may have to compute a “delegate-key” for her assistant, Charlie. For example, Alice is conducting a ... See full document

31

Cryptographic  Agents:  Towards  a  Unified  Theory  of  Computing  on  Encrypted  Data

Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data

... While this assumption may appear too strong at first sight – given the impossibility results surrounding the generic group model – we argue that it is plausible. Firstly, observe that primitives that can be captured as ... See full document

51

Efficient VLSI Implementation of DES and Triple DES Algorithm with Cipher Block Chaining concept using Verilog and FPGA

Efficient VLSI Implementation of DES and Triple DES Algorithm with Cipher Block Chaining concept using Verilog and FPGA

... ABSTRACT In this paper, Data Encryption Standard DES and Triple Data Encryption Standard TDES algorithm and their efficient hardware implementation in cyclone II Field Programmable Gate [r] ... See full document

10

Unbounded  Inner  Product  Functional  Encryption  from  Bilinear  Maps

Unbounded Inner Product Functional Encryption from Bilinear Maps

... about encryption, key generation, and ...an encryption or key generation algorithm, ...and encryption and key generation are executed correspondingly to its index ...to encryption or key gen- ... See full document

55

Distributed  Web  Systems  Leading  to  Hardware  Oriented  Cryptography   and  Post-Quantum  Cryptologic  Methodologies

Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies

... Quantum level encryption can implement similar techniques through a Qubit-based processing mechanism. Quantum cryptography can implement Quantum Recursiveness in its hashing that would allow for recursive hashing ... See full document

7

Implementation of Dedicated Hardware Using Encryption Technology

Implementation of Dedicated Hardware Using Encryption Technology

... Going from a basic quasi-pipelined AES-CTR design to the 3x-unrolled designs reduces the number of clock cycles by a factor of ...video encryption system feasible for real-time ... See full document

6

Indistinguishability  Obfuscation  from  Functional  Encryption

Indistinguishability Obfuscation from Functional Encryption

... results from the literature, implies that any IO scheme can be turned into an IO scheme where the obfuscation only grows linearly in the size of the ...puncturable functional encryption with a ... See full document

44

Survey on Implementation of Dedicated Hardware for Encryption

Survey on Implementation of Dedicated Hardware for Encryption

... Key Expansion routine to perform key scheduling which generate a series of Round Keys from the cipher key as shown figure 6. SubWord present in Key Expansion routine that takes a 4-byte input word gives 4-bytes ... See full document

8

Show all 10000 documents...