搜索结果: 1-15 共查到“军队指挥学 Signature”相关记录422条 . 查询时间(0.14 秒)
Modeling Memory Faults in Signature and Encryption Schemes
fault attacks security model fault resilience deterministic signatures
2019/9/19
Memory fault attacks, inducing errors in computations, have been an ever-evolving threat to cryptographic schemes since their discovery for cryptography by Boneh et al. (Eurocrypt 1997). Initially req...
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
multi-proxy multi-signature scheme multi-signature scheme ID-based signature
2019/9/16
Multi-proxy multi-signature schemes are useful in distributed networks, where a group of users cooperatively could delegate their administrative rights to the users of another group, who are authorize...
Security analysis of two lightweight certificateless signature schemes
Certificateless cryptography Cryptanalysis Signature
2019/8/19
Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography (ID-PKC). Th...
Abstract. The extremely efficient Rabin-Williams signature scheme relies on decryption of a quadratic equation in order to retrieve the original message. Customarily, square roots are found using the ...
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Multivariate public key cryptosystem Cryptanalysis Oil Vinegar Signature Scheme
2019/8/6
In 2017 Kyung-Ah Shim et al proposed a multivariate signature scheme called Himq-3 which is a submission to National Institute of Standards and Technology (NIST) standardization process of post-quantu...
The Simplest Multi-key Linearly Homomorphic Signature Scheme
Multi-key homomorphic signatures cryptographic pairings efficient software implementation
2019/7/18
We consider the problem of outsourcing computation on data authenticated by different users. Our aim is to describe and implement the simplest possible solution to provide data integrity in cloud-base...
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Undeniable quantum signature scheme Impersonation attack Quantum asymmetric cryptography
2019/7/15
In recent years, several cryptographic scholars have proposed quantum blind signature schemes. However, their methods require the signatories and the inspectors to share common keys in advance, which ...
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Lattice-Based Cryptography Fuzzy Signatures Biometrics Reusability
2019/6/26
In this paper, we introduce a new construction of lattice-based reusable fuzzy signature for remote user authentication that is secure against quantum computers. We define formal security models for t...
A Modified pqsigRM: RM Code-Based Signature Scheme
Code-based cryptography Courtois Finiasz
2019/6/12
We propose a novel signature scheme based on a modified Reed--Muller (RM) code, which reduces the signing complexity and key size compared to existing code-based signature schemes. This cheme is calle...
A Server-Assisted Hash-Based Signature Scheme
digital signatures hash functions public-key cryptography
2019/6/10
We present a practical digital signature scheme built from a cryptographic hash function and a hash-then-publish digital time- stamping scheme. We also provide a simple proof of existential unforgeabi...
A Blockchain-Assisted Hash-Based Signature Scheme
digital signatures hash functions public-key cryptography
2019/6/10
We present a server-supported, hash-based digital signature scheme. To achieve greater efficiency than current state of the art, we relax the security model somewhat. We postulate a set of design requ...
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
digital signatures hash functions public-key cryptography
2019/6/10
A new hash-based, server-supported digital signature scheme was proposed recently. We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the ...
Subliminal channels in post-quantum digital signature schemes
Subliminal channels post-quantum digital signatures
2019/5/29
We analyze the digital signatures schemes submitted to NIST's Post-Quantum Cryptography Standardization Project in search for subliminal channels.
(Linkable) Ring Signature from Hash-Then-One-Way Signature
ring signature linkable ring signature lattice-based cryptography
2019/5/28
In this paper, we revisit the generic construction of ring signatures from hash-then-one-way type (Type−HType−H) signatures proposed by Abe et al. (AOS) in 2004 and made the following cont...
Evaluation of Code-based Signature Schemes
post-quantum cryptography code-based cryptography signature scheme
2019/5/23
Code-based cryptographic schemes recently raised to prominence as quantum-safe alternatives to the currently employed number-theoretic constructions, which do not resist quantum attacks. In this artic...