搜索结果: 106-120 共查到“军事学 Signature”相关记录422条 . 查询时间(0.046 秒)
A Provably Secure Code-based Concurrent Signature Scheme
public-key cryptography Concurrent Signature Scheme
2016/5/11
Concurrent signatures allow two entities to generate two signatures in such a way that both signatures are ambiguous till some information is revealed by one of the parties. This kind of signature is ...
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
lattice-based cryptography signature scheme fault attack
2016/5/3
Due to their high efficiency and their strong security properties, lattice-based cryptographic schemes seem to be a very promising post-quantum replacement for currently used public key cryptography. ...
A Digital Signature Scheme Based on Random Split of St-Gen Codes
Public Key Cryptography Code Based Cryptosystems
2016/4/21
Recently we proposed a method for a random split of Staircase-Generator codes (St-Gen codes) to counter the weaknesses found in the previous constructions of public key schemes using St-Gen codes. The...
Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme
SCA FLUSH+RELOAD lattices
2016/3/18
We present the first side-channel attack on a lattice-based signature scheme, using the FLUSH+RELOAD cache-attack. The attack is targeted at the discrete Gaussian sampler, an important step in the Bim...
An aggregate signature scheme is the aggregation of multiple signatures
into a single compact signature of short string that can convince to any arbitrary
verifier participating in the scheme. The a...
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Lattice-based cryptography anonymity signatures with efficient protocols
2016/2/23
A recent line of works – initiated by Gordon, Katz and Vaikuntanathan
(Asiacrypt 2010) – gave lattice-based constructions allowing
users to authenticate while remaining hidden in a crowd. Despite fi...
Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
post-quantum cryptography isogeny-based cryptography
2016/2/23
In this paper, we propose an Undeniable Blind Signature
scheme (UBSS) based on isogenies between supersingular elliptic curves.
The proposed UBSS is an extension of the Jao-Soukharev undeniable
sig...
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
lattice-based cryptography tightness ideal lattices signatures
2016/1/27
In view of the expected progress in cryptanalysis it is important to find alternatives for currently
used signature schemes such as RSA and ECDSA. The most promising lattice-based signature
schemes ...
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Proxy signature certificate-based message recovery
2016/1/26
In this paper, we propose the first provable secure certificate-based proxy signature with message
recovery without bilinear pairing. The notion of certificate-based cryptography was initially
intro...
Lattice-based Group Signature Scheme with Verifier-local Revocation
group signature verifier-local revocation lattice-based cryptography
2016/1/26
Support of membership revocation is a desirable functionality for any group signature scheme.
Among the known revocation approaches, verifier-local revocation (VLR) seems to be the most flexible one,...
Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices
Code-based Cryptography Stern’s Scheme Signature
2016/1/25
Amongst areas of cryptographic research, there has recently been a widening
interest for code-based cryptosystems and their implementations. Besides the a priori resistance
to quantum computer attac...
Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
Identity-based signature Strongly unforgeability Security analysis
2016/1/23
Identity-based signature (IBS) is a specific type of public-key signature (PKS) where any identity string ID can be used for the public key of a user. Although an IBS scheme can be constructed from a...
Identity-based encryption and digital signature schemes using extended chaotic maps
Chaotic maps Identity-based encryption Digital signature
2016/1/23
This paper designed a new extended chaotic map-based Identity-based encryption (ECM-IBE) scheme and Identitybased digital signature (ECM-IDS) scheme using extended chaotic maps. The security of the E...
Design of identity-based digital signature schemes using extended chaotic maps
Chaotic maps Identity-based encryption Digital signature
2016/1/23
Inspired from the Identity-based cryptosystem proposed by Adi Shamir, and Boneh and Franklin, this paper designed a new Identity-based digital signature (ECM-IDS) scheme using extended chaotic maps. ...
A Strong and Efficient Certificateless Digital Signature Scheme
certificateless signature certificateless public key
2016/1/9
This paper extends the certificateless public key infrastructure model that was proposed by
Hassouna et al by proposing new digital signature scheme to provide true non-repudiation,
the proposed sig...