Results 61 to 70 of about 774 (86)
Tame logarithmic signatures of abelian groups
The security of the asymmetric cryptosystem MST1{{}_{1}} relies on the hardness of factoring group elements with respect to a logarithmic signature. In this paper we investigate the factorization problem with respect to logarithmic signatures of abelian ...
Reichl Dominik
doaj +1 more source
From Random Numbers to Random Objects. [PDF]
Zolfaghari B, Bibak K, Koshiba T.
europepmc +1 more source
On the quantum security of high-dimensional RSA protocol
The idea of extending the classical RSA protocol using algebraic number fields was introduced by Takagi and Naito (Construction of RSA cryptosystem over the algebraic field using ideal theory and investigation of its security.
Rahmani Nour-eddine +3 more
doaj +1 more source
Composite order pairing setting has been used to achieve cryptographic functionalities beyond what is attainable in prime order groups. However, such pairings are known to be significantly slower than their prime order counterparts.
Chatterjee Sanjit +2 more
doaj +1 more source
Revocable policy-based chameleon hash using lattices
A chameleon hash function is a type of hash function that involves a trapdoor to help find collisions, i.e., it allows the rewriting of a message without modifying the hash.
Klamti Jean Belo, Hasan Mohammed Anwarul
doaj +1 more source
There are many group-based cryptosystems in which the security is related to the conjugacy search problem or the simultaneous conjugacy search problem in their underlying platform groups.
Kahrobaei Delaram +4 more
doaj +1 more source
Orienteering with One Endomorphism. [PDF]
Arpin S +5 more
europepmc +1 more source
Dynamic-FROST: Schnorr threshold signatures with a flexible committee
Threshold signatures enable any subgroup of predefined cardinality tt out of a committee of nn participants to generate a valid, aggregated signature.
Cimatti Annalisa +7 more
doaj +1 more source
Rumour prevention in social networks with layer 2 blockchains. [PDF]
Thakur S, Breslin JG.
europepmc +1 more source
Functional encryption for set intersection in the multi-client setting. [PDF]
Lee K, Seo M.
europepmc +1 more source

