搜索结果: 1-15 共查到“军事学 signatures”相关记录467条 . 查询时间(0.533 秒)
Sharing the LUOV: Threshold Post-Quantum Signatures
cryptographic protocols linear secret shared schemes
2019/9/19
We examine all of the signature submissions to Round-2 of the NIST PQC ``competition'' in the context of whether one can transform them into threshold signature schemes in a relatively straight forwar...
Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs
Structure-preserving signatures QA-NIZK simulation-soundness
2019/9/16
We show how to construct structure-preserving signatures (SPS) and unbounded quasi-adaptive non-interactive zero-knowledge (USS QA-NIZK) proofs with a tight security reduction to simple assumptions, b...
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures
Digital Signature Lattice
2019/9/16
We study a relaxed notion of lattice trapdoor called approximate trapdoor, which is defined to be able to invert Ajtai's one-way function approximately instead of exactly. The primary motivation of ou...
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Puncturable Signatures PoS Blockchain
2019/8/30
Proof-of-stake (PoS) blockchain protocols are emerging as one of the most promising alternative to the energy-consuming proof-of-work protocols. However, one particularly critical threat in the PoS se...
Security of Hedged Fiat-Shamir Signatures under Fault Attacks
signature schemes fault attacks Fiat-Shamir signatures
2019/8/22
Deterministic generation of per-signature randomness has been a widely accepted solution to mitigate the catastrophic risk of randomness failure in Fiat-Shamir type signature schemes. However, recent ...
Traceable and linkable ring signatures, traceable range proofs and applications on regulatable privacy-preserving blockchains
regulatable blockchain privacy preserving decentralization
2019/8/19
Privacy protection has been extensively studied in the current blockchain research field. As representations, Monero and Zerocash have realized completely anonymous and amount-hiding transactions. How...
Blind Schnorr Signatures in the Algebraic Group Model
Schnorr signatures blind signatures algebraic group model
2019/8/2
We study the security of schemes related to Schnorr signatures in the algebraic group model (AGM) proposed by Fuchsbauer, Kiltz, and Loss (CRYPTO 2018), where the adversary can only compute new group ...
A Tale of Three Signatures: practical attack of ECDSA with wNAF
ECDSA lattice techniques cryptanalysis
2019/7/25
Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this p...
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures
signature schemes symbolic models formal methods
2019/7/10
The standard definition of security for digital signatures---existential unforgeability---does not ensure certain properties that protocol designers might expect. For example, in many modern signature...
This works studies the use of the AES block-cipher for Picnic-style signatures, which work in the multiparty-computation-in-the-head model. It applies advancements to arithmetic circuits for the compu...
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Deterministic Lattice Signatures pqm4 Fault Attack
2019/7/8
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes. In particular, we extend the practicality of skip-addition fault attacks thro...
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage
Randomness leakage attacks Fiat-Shamir signature Dilithium
2019/6/19
Leakage during the signing process, including partial key exposure and partial (or complete) randomness leakage, may be devastating for the security of digital signatures. In this work, we consider th...
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-
Blockchain Digital Signatures Zero-knowledge Proofs
2019/6/5
Timestamping is an important cryptographic primitive with numerous applications. The availability of a decentralized blockchain such as that offered by the Bitcoin protocol offers new possibilities to...
Efficient Invisible and Unlinkable Sanitizable Signatures
public-key cryptography Unlinkable Sanitizable Signatures
2019/6/5
Sanitizable signatures allow designated parties (the sanitizers) to apply arbitrary modifications to some restricted parts of signed messages. A secure scheme should not only be unforgeable, but also ...
We describe an efficient linkable ring signature scheme, compact linkable spontaneous anonymous group (CLSAG) signatures, for use in confidential transactions. Compared to the existing signature schem...