搜索结果: 76-90 共查到“军事学 Signature”相关记录422条 . 查询时间(0.031 秒)
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
cache side channels lattice-based signature schemes program analysis
2017/9/28
In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signature scheme ring-TESLA is expected to be resistant even against quantum adversaries. Due to a recent...
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero
Cryptographic Currency Anonymity
2017/9/25
In this work, we initially study the necessary properties and security requirements of Ring Confidential Transaction (RingCT) protocol deployed in the popular anonymous cryptocurrency Monero. Firstly,...
A Universal Designated Verifier Signature Scheme with Non-Delegatability in the Standard Model
Designated Verifier Signature Universal Designated Verifier Signature Non-Delegatability
2017/9/1
In a designated verifier signature (DVS) scheme a signer creates a signature which is only verifiable by a designated verifier. A DVS is a useful scheme for authenticating a signer without disturbing ...
Multi-Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model
Digital Signature Designated Verifier Signature Scheme Multi-Designated Verifiers Signature Scheme
2017/8/28
In a designated verifier signature (DVS) scheme, the validity of the signature can only be verified by a designated entity chosen by the signer. Furthermore, the designated entity cannot convince a th...
GLYPH: A New Insantiation of the GLP Digital Signature Scheme
Cryptography Post-Quantum Cryptography Lattice
2017/8/10
In 2012 Guneysu, et al. proposed GLP, a practical and efficient post-quantum digital signature scheme based on the computational hardness of the Ring Learning With Errors problem. It has some advantag...
On the Tightness of Forward-Secure Signature Reductions
Forward-security signatures lossy identification
2017/8/10
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shamir transform and show that they can admit tighter reductions to certain decisional complexity assumpt...
A new signature scheme based on (U|U+V) codes
public-key cryptography code-based digital signature scheme
2017/7/6
We present here a new code-based digital signature scheme. This scheme uses (U|U+V)(U|U+V) codes, where both UU and VV are random. We prove that the scheme achieves {\em existential unforgeability und...
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
identity-based signature certificateless signature black-box construction
2017/6/28
To simplify the certificate management procedures, Shamir introduced the concept of identity-based cryptography (IBC). However, the key escrow problem is inherent in IBC. To get rid of it, Al-Riyami a...
Further Analysis of a Proposed Hash-Based Signature Standard
public-key cryptography McGrew
2017/6/9
We analyze the concrete security of a hash-based signature scheme described in the most recent Internet Draft by McGrew, Fluhrer and Curcio. We perform this analysis in the random-oracle model, where ...
LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards
post-quantum cryptography hash based signatures hbs
2017/4/27
Quantum computing poses challenges to public key signature schemes as we know them today. LMS and XMSS are two hash based signature schemes that have been proposed in the IETF as quantum secure. Both ...
Multivariate Cryptography is one of the main candidates for creating post-quantum cryptosystems. Especially in the area of digital signatures, there exist many practical and secure multivariate scheme...
A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies
digital signatures isogenies post-quantum cryptography
2017/3/6
We present the first general-purpose digital signature scheme based on supersingular elliptic curve isogenies secure against quantum adversaries in the quantum random oracle model with small key sizes...
Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings
cryptographic protocols CLS
2017/3/6
In these years, the design of certificateless signature (CLS) scheme without bilinear pairings has been thoroughly investigated owing to its effectiveness on solving the key escrow problem in identity...
WalnutDSA(TM): A Quantum Resistant Group Theoretic Digital Signature Algorithm
Digital Signature E-Multiplication Braids
2017/2/20
In 2005 I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux introduced E-Multiplication, a quantum-resistant group-theoretic one-way function which can be used as a basis for many different cryptographi...
A Practical Multivariate Blind Signature Scheme
Multivariate Cryptography Blind Signatures Rainbow Signature Scheme
2017/2/20
Multivariate Cryptography is one of the main candidates for creating post-quantum cryptosystems. Especially in the area of digital signatures, there exist many practical and secure multivariate scheme...