نتایج جستجو برای: malleable

تعداد نتایج: 1939  

1999
Amit Sahai

We introduce the notion of non-malleable noninteractive zero-knowledge (NIZK) proof systems. We show how to transform any ordinary NIZK proof system into one that has strong non-malleability properties. We then show that the elegant encryption scheme of Naor and Yung [NY] can be made secure against the strongest form of chosen-ciphertext attack by using a non-malleable NIZK proof instead of a s...

Journal: :IACR Cryptology ePrint Archive 2009
Seiko Arita

It is known that composable secure commitments, that is, concurrent non-malleable commitments exist in the plain model, based only on standard assumptions such as the existence of claw-free permutations or even one-way functions. Since being based on the plain model, the deniability of them is trivially satisfied, and especially the latter scheme satisfies also adaptivity, hence it is adaptived...

Journal: :SIAM Review 2000
Danny Dolev Cynthia Dwork Moni Naor

The notion of non-malleable cryptography, an extension of semantically secure cryptography , is deened. Informally, the additional requirement is that given the ciphertext it is impossible to generate a diierent ciphertext so that the respective plaintexts are related. The same concept makes sense in the contexts of string commitment and zero-knowledge proofs of possession of knowledge. Non-mal...

2008
Rafail Ostrovsky Giuseppe Persiano Ivan Visconti

One of the central questions in Cryptography is the design of round-efficient protocols that are secure under concurrent man-in-the-middle attacks. In this paper we present the first constant-round concurrent non-malleable zero-knowledge argument system for NP in the Bare Public-Key model [Canetti et al. STOC 2000], resolving one of the major open problems in this area. To achieve our result, w...

2016
Ibrahim Kucukturkmen Yusuf Kadir Topcu Tansu Degirmenci Ozgu Aydogdu Ibrahim Halil Bozkurt Serkan Yarimoglu Salih Polat

A 75-year-old male had failed to respond conservative therapy for erectile dysfunction and had undergone insertion of a malleable penile prosthesis in 1995. Twenty years after the initial implant he presented with right-sided prosthesis localized in the buttock. There was no infection. The prosthesis was extracted through an incision in the right hip. As in the recent case, mechanical failures ...

2016
Marcelo Almeida Pinheiro Haroldo Brasil Barroso Filho Francisco José Cabral Mesquita Ivon Teixeira de Souza Rafael Silva Guimarães Everaldo Moura Santos Rômulo Augusto da Silveira Rommel Prata Regadas Geraldo Munguba Macedo

Penile prosthesis implant is the definitive treatment for refractory erectile dysfunction. Fracture of malleable prosthesis is rarely described due to its low incidence. We describe a case of multiple, bilateral fracture of a malleable penile implant, ten years after implantation. After the diagnosis, a review surgery was performed and the implants were replaced. No corporal rupture or urethral...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2014
Divesh Aggarwal Stefan Dziembowski Tomasz Kazana Maciej Obremski

A recent trend in cryptography is to construct cryptosystems that are secure against physical attacks. Such attacks are usually divided into two classes: the leakage attacks in which the adversary obtains some information about the internal state of the machine, and the tampering attacks where the adversary can modify this state. One of the popular tools used to provide tamper-resistance are th...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1999
C Fong K McCabe

Human decision making under risk and uncertainty may depend on individual involvement in the outcome-generating process. Expected utility theory is silent on this issue. Prospect theory in its current form offers little, if any, prediction of how or why involvement in a process should matter, although it may offer ex post interpretations of empirical findings. Well-known findings in psychology ...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2018
Xin Li

The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open problems in the following five seemingly different topics: seeded non-malleable extractors, privacy amplification protocols with an active adversary, independent source extractors (and explicit Ramsey graphs), non-malleable in...

Journal: :Coatings 2021

The success of recent material science and applications in biotechnologies should be credited to developments malleable surface properties, as well the adaptation conjugation reactions [...]

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید