搜索结果: 121-135 共查到“军事学 Signature”相关记录422条 . 查询时间(0.078 秒)
Bounded Fully Homomorphic Signature Schemes
homomorphic signature indistinguishability obfuscation differing-inputs obfuscation
2016/1/9
Homomorphic signatures enable anyone to publicly perform computations on signed data
and produce a compact tag to authenticate the results. In this paper, we construct two bounded fully
homomorphic ...
Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
public-key cryptography proxy key
2016/1/8
An identity-based multi-proxy signature is a type of proxy signatures in which the delegation of signing right is distributed among a number of proxy signers. In this type of cryptographic primitive, ...
Automated algebraic analysis of structure-preserving signature schemes
structure-preserving signature schemes automated analysis algebraic analysis
2016/1/8
Structure-preserving signature schemes can be very useful in the construction of new cryptographic
operations like blind signatures. Recently several of these schemes have been proposed.
The securit...
Type 2 Structure-Preserving Signature Schemes Revisited
cryptographic schemes concrete perspective
2016/1/7
At CRYPTO 2014, Abe et al. presented generic-signer structure-preserving
signature schemes using Type 2 pairings. According to the authors, the proposed constructions
are optimal with only two group...
We present security proofs for the BLT signature scheme in the model, where hash functions
are built from ideal components (random oracles, ideal ciphers, etc.). We show that certain strengthening
o...
We introduce the concept of universal signature aggregators. In a universal signature aggregator
system, a third party, using a set of common reference parameters, can aggregate a collection of signa...
Online/Off-line Ring Signature Scheme with Provable Security
unforgeability ring members signer anonymity
2016/1/6
The article proposes an Online/Off-line Ring Signature Scheme in random oracle
model.Security of the scheme relies on both Computational Diffie-Hellman and k-CAA
problems. The proposed scheme is pro...
Operational Signature Schemes
Foundations functional cryptography random oracle obfuscation
2016/1/6
Functional encryption, as introduced by Boneh, Sahai, and Waters (TCC’11), generalizes
public-key encryption systems to include functional decryption capabilities.
Recently, Boyle et al. as well as ...
Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -
ECDSA signature verification NIST P-256
2016/1/6
Car-to-car and Car-to-Infrastructure messages exchanged in Intelligent Transportation Systems can
reach reception rates up to and over 1000 messages per second. As these messages contain ECDSA signat...
Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014
digital signatures forgery
2016/1/6
We show how to compute an existential forgery after querying 4 signatures on chosen messages
for a signature scheme presented at Asiacrypt 2014.
The Security of the Hanser-Slamanig Signature Scheme Revisited
Structure-preserving signature chosen-message attack
2016/1/6
At Asiacrypt 2014, Hanser and Slamanig presented a structure-preserving
signatures and prove its EUF-CMA security. Very recently, Fuchsbauer gave
a very surprising attack to point out their claim is...
Group Signature with Deniability: How to Disavow a Signature
group signature deniability non-interactive zero-knowledge proof
2016/1/4
Group signatures are a class of digital signatures with enhanced privacy. By using this type of
signature, a user can sign a message on behalf of a specific group without revealing his identity, but ...
Constant Size Ring Signature Without Random Oracle
Ring Signature Set Membership Groth-Sahai protocol
2016/1/3
Ring signature enables an user to anonymously sign a message on behalf of a group of
users termed as ‘ring’ formed in an ‘ad-hoc’ manner. A naive scheme produces a signature linear in
the size of th...
Tighter Reductions for Forward-Secure Signature Schemes
Forward-security signatures lossy identification
2016/1/3
In this paper, we revisit the security of factoring-based signature
schemes built via the Fiat-Shamir transform and show that they
can admit tighter reductions to certain decisional complexity assum...
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
cryptanalysis digital signatures implementation
2015/12/31
This paper describes a bug in the implementation of the RabinWilliams
digital signature in the Crypto++ framework. The bug is in
the misuse of blinding technique that is aimed at preventing timing
...