搜索结果: 16-30 共查到“军事学 signature schemes”相关记录98条 . 查询时间(0.025 秒)
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
identity-based signature certificateless signature black-box construction
2017/6/28
To simplify the certificate management procedures, Shamir introduced the concept of identity-based cryptography (IBC). However, the key escrow problem is inherent in IBC. To get rid of it, Al-Riyami a...
Multivariate Cryptography is one of the main candidates for creating post-quantum cryptosystems. Especially in the area of digital signatures, there exist many practical and secure multivariate scheme...
Signature Schemes Based On Supersingular Isogeny Problems
Supersingular Isogeny Problems public-key cryptography
2016/12/24
We present the first signature schemes whose security relies on computational assumptions relating to isogeny graphs of supersingular elliptic curves. We give two schemes. The first one is obtained fr...
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
lattice-based cryptography signature scheme fault attack
2016/5/3
Due to their high efficiency and their strong security properties, lattice-based cryptographic schemes seem to be a very promising post-quantum replacement for currently used public key cryptography. ...
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Lattice-based cryptography anonymity signatures with efficient protocols
2016/2/23
A recent line of works – initiated by Gordon, Katz and Vaikuntanathan
(Asiacrypt 2010) – gave lattice-based constructions allowing
users to authenticate while remaining hidden in a crowd. Despite fi...
Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices
Code-based Cryptography Stern’s Scheme Signature
2016/1/25
Amongst areas of cryptographic research, there has recently been a widening
interest for code-based cryptosystems and their implementations. Besides the a priori resistance
to quantum computer attac...
Identity-based encryption and digital signature schemes using extended chaotic maps
Chaotic maps Identity-based encryption Digital signature
2016/1/23
This paper designed a new extended chaotic map-based Identity-based encryption (ECM-IBE) scheme and Identitybased digital signature (ECM-IDS) scheme using extended chaotic maps. The security of the E...
Design of identity-based digital signature schemes using extended chaotic maps
Chaotic maps Identity-based encryption Digital signature
2016/1/23
Inspired from the Identity-based cryptosystem proposed by Adi Shamir, and Boneh and Franklin, this paper designed a new Identity-based digital signature (ECM-IDS) scheme using extended chaotic maps. ...
Bounded Fully Homomorphic Signature Schemes
homomorphic signature indistinguishability obfuscation differing-inputs obfuscation
2016/1/9
Homomorphic signatures enable anyone to publicly perform computations on signed data
and produce a compact tag to authenticate the results. In this paper, we construct two bounded fully
homomorphic ...
Automated algebraic analysis of structure-preserving signature schemes
structure-preserving signature schemes automated analysis algebraic analysis
2016/1/8
Structure-preserving signature schemes can be very useful in the construction of new cryptographic
operations like blind signatures. Recently several of these schemes have been proposed.
The securit...
Type 2 Structure-Preserving Signature Schemes Revisited
cryptographic schemes concrete perspective
2016/1/7
At CRYPTO 2014, Abe et al. presented generic-signer structure-preserving
signature schemes using Type 2 pairings. According to the authors, the proposed constructions
are optimal with only two group...
Operational Signature Schemes
Foundations functional cryptography random oracle obfuscation
2016/1/6
Functional encryption, as introduced by Boneh, Sahai, and Waters (TCC’11), generalizes
public-key encryption systems to include functional decryption capabilities.
Recently, Boyle et al. as well as ...
Tighter Reductions for Forward-Secure Signature Schemes
Forward-security signatures lossy identification
2016/1/3
In this paper, we revisit the security of factoring-based signature
schemes built via the Fiat-Shamir transform and show that they
can admit tighter reductions to certain decisional complexity assum...
Homomorphic Signature Schemes - A survey
Linearly homomorphic signature schemes homomorphic signature schemes for polynomial functions homomorphic aggregate signature schemes
2015/12/29
Homomorphic signature schemes are an important primitive for many applications
and since their introduction numerous solutions have been presented. Thus, in this
work we provide the first exhaustive...
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
elliptic curve cryptography hyperelliptic curve cryptography scalar multiplication
2015/12/22
We give a general framework for uniform, constant-time oneand
two-dimensional scalar multiplication algorithms for elliptic curves
and Jacobians of genus 2 curves that operate by projecting to the x...