搜索结果: 1-15 共查到“军队指挥学 signature scheme”相关记录195条 . 查询时间(0.14 秒)
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
multi-proxy multi-signature scheme multi-signature scheme ID-based signature
2019/9/16
Multi-proxy multi-signature schemes are useful in distributed networks, where a group of users cooperatively could delegate their administrative rights to the users of another group, who are authorize...
Abstract. The extremely efficient Rabin-Williams signature scheme relies on decryption of a quadratic equation in order to retrieve the original message. Customarily, square roots are found using the ...
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Multivariate public key cryptosystem Cryptanalysis Oil Vinegar Signature Scheme
2019/8/6
In 2017 Kyung-Ah Shim et al proposed a multivariate signature scheme called Himq-3 which is a submission to National Institute of Standards and Technology (NIST) standardization process of post-quantu...
The Simplest Multi-key Linearly Homomorphic Signature Scheme
Multi-key homomorphic signatures cryptographic pairings efficient software implementation
2019/7/18
We consider the problem of outsourcing computation on data authenticated by different users. Our aim is to describe and implement the simplest possible solution to provide data integrity in cloud-base...
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Undeniable quantum signature scheme Impersonation attack Quantum asymmetric cryptography
2019/7/15
In recent years, several cryptographic scholars have proposed quantum blind signature schemes. However, their methods require the signatories and the inspectors to share common keys in advance, which ...
A Modified pqsigRM: RM Code-Based Signature Scheme
Code-based cryptography Courtois Finiasz
2019/6/12
We propose a novel signature scheme based on a modified Reed--Muller (RM) code, which reduces the signing complexity and key size compared to existing code-based signature schemes. This cheme is calle...
A Server-Assisted Hash-Based Signature Scheme
digital signatures hash functions public-key cryptography
2019/6/10
We present a practical digital signature scheme built from a cryptographic hash function and a hash-then-publish digital time- stamping scheme. We also provide a simple proof of existential unforgeabi...
A Blockchain-Assisted Hash-Based Signature Scheme
digital signatures hash functions public-key cryptography
2019/6/10
We present a server-supported, hash-based digital signature scheme. To achieve greater efficiency than current state of the art, we relax the security model somewhat. We postulate a set of design requ...
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
lattices fault attacks Falcon
2019/5/14
Post-quantum cryptography is an important and growing area of research due to the threat of quantum computers, as recognised by the National Institute of Standards and Technology (NIST) recent call fo...
A Method to Reduce the Key Size of UOV Signature Scheme
digital signatures public-key cryptography
2019/5/13
Multivariate public key signature scheme has a good performance on speed and signature size. But most of them have a huge public key size. In this paper, we propose a new method to reduce the public k...
A Traceable Ring Signature Scheme based on Coding Theory
cryptographic protocols digital signatures
2019/4/1
Traceable ring signatures are a variant of ring signatures which allows the identity of a user to be revealed, when it signs two different messages with respect to the same group of users. It has appl...
Analysis of TPL Signature Scheme
Post-quantum Signatures Cryptanalysis Key Recovery Attack
2019/3/21
Tan et al. proposed a rank metric code-based signature (TPL) in the 2018 International Symposium on Information Theory and Its Application [3]. Their proposal has compact key size (8.298.29KB, 1.971.9...
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Group signature Cryptanalysis ISO/IEC 20008-2 SGX
2019/3/18
In ISO/IEC 20008-2, several anonymous digital signature schemes are specified. Among these, the scheme denoted as Mechanism 6, is the only plain group signature scheme that does not aim at providing a...
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes
graded encoding schemes multi-linear maps GDL problem
2019/2/28
The Winternitz one-time signature (WOTS) scheme, which can be described using a certain number of so-called ``function chains", plays an important role in the design of both stateless and stateful man...
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019
RQCS digital signatures cryptanalysis
2019/2/27
Song, Huang, Mu, and Wu proposed a new code-based signature scheme, the Rank Quasi-Cyclic Signature (RQCS) scheme (PKC 2019, Cryptology ePrint Archive 2019/053), which is based on an IND-CCA2 KEM sche...