Results 61 to 70 of about 774 (86)

Tame logarithmic signatures of abelian groups

open access: yesJournal of Mathematical Cryptology, 2017
The security of the asymmetric cryptosystem MST1{{}_{1}} relies on the hardness of factoring group elements with respect to a logarithmic signature. In this paper we investigate the factorization problem with respect to logarithmic signatures of abelian ...
Reichl Dominik
doaj   +1 more source

From Random Numbers to Random Objects. [PDF]

open access: yesEntropy (Basel), 2022
Zolfaghari B, Bibak K, Koshiba T.
europepmc   +1 more source

On the quantum security of high-dimensional RSA protocol

open access: yesJournal of Mathematical Cryptology
The idea of extending the classical RSA protocol using algebraic number fields was introduced by Takagi and Naito (Construction of RSA cryptosystem over the algebraic field using ideal theory and investigation of its security.
Rahmani Nour-eddine   +3 more
doaj   +1 more source

Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis

open access: yesJournal of Mathematical Cryptology, 2018
Composite order pairing setting has been used to achieve cryptographic functionalities beyond what is attainable in prime order groups. However, such pairings are known to be significantly slower than their prime order counterparts.
Chatterjee Sanjit   +2 more
doaj   +1 more source

Revocable policy-based chameleon hash using lattices

open access: yesJournal of Mathematical Cryptology
A chameleon hash function is a type of hash function that involves a trapdoor to help find collisions, i.e., it allows the rewriting of a message without modifying the hash.
Klamti Jean Belo, Hasan Mohammed Anwarul
doaj   +1 more source

Investigation of metabelian platform groups for protocols based on (simultaneous) conjugacy search problem

open access: yesJournal of Mathematical Cryptology
There are many group-based cryptosystems in which the security is related to the conjugacy search problem or the simultaneous conjugacy search problem in their underlying platform groups.
Kahrobaei Delaram   +4 more
doaj   +1 more source

Orienteering with One Endomorphism. [PDF]

open access: yesMathematica (N Y), 2023
Arpin S   +5 more
europepmc   +1 more source

Dynamic-FROST: Schnorr threshold signatures with a flexible committee

open access: yesJournal of Mathematical Cryptology
Threshold signatures enable any subgroup of predefined cardinality tt out of a committee of nn participants to generate a valid, aggregated signature.
Cimatti Annalisa   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy