all InfoSec news
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model
Feb. 15, 2023, 7:54 a.m. |
IACR News www.iacr.org
ePrint Report: Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model
Shuai Han, Shengli Liu, Dawu Gu
In this paper, we consider tight multi-user security under adaptive corruptions, where the adversary can adaptively corrupt some users and obtain their secret keys. We propose generic constructions for a bunch of primitives, and the instantiations from the matrix decision Diffie-Hellman (MDDH) assumptions yield the following schemes:
(1) the first digital signature (SIG) scheme achieving almost tight strong EUF-CMA …
adversary amp corrupt decision diffie eprint report hellman keys matrix report secret secret keys security standard under user security
More from www.iacr.org / IACR News
Secure Coded Distributed Computing
2 days, 11 hours ago |
www.iacr.org
Secure Implementation of SRAM PUF for Private Key Generation
2 days, 11 hours ago |
www.iacr.org
Multiple academic teaching positions
3 days, 10 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Security Analyst
@ Northwestern Memorial Healthcare | Chicago, IL, United States
GRC Analyst
@ Richemont | Shelton, CT, US
Security Specialist
@ Peraton | Government Site, MD, United States
Information Assurance Security Specialist (IASS)
@ OBXtek Inc. | United States
Cyber Security Technology Analyst
@ Airbus | Bengaluru (Airbus)
Vice President, Cyber Operations Engineer
@ BlackRock | LO9-London - Drapers Gardens