Results 21 to 30 of about 10,318 (256)

Expanders and right-angled Artin groups

open access: yes, 2021
The purpose of this article is to give a characterization of families of expander graphs via right-angled Artin groups. We prove that a sequence of simplicial graphs $\{\Gamma_i\}_{i\in\mathbb{N}}$ forms a family of expander graphs if and only if a ...
Flores, Ramón   +2 more
core   +1 more source

Efficient identity-based authenticated multiple key exchange protocol - doi: 10.4025/actascitechnol.v35i4.16434

open access: yesActa Scientiarum: Technology, 2013
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party.
Yitao Chen, Weiwei Han
doaj   +1 more source

Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings

open access: yesIEEE Access, 2021
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties.
Xiwei Shan, Lin You, Gengran Hu
doaj   +1 more source

A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings

open access: yesJournal of Applied Mathematics, 2014
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj   +1 more source

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]

open access: yes, 2004
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core   +2 more sources

Limited Verifier Signature from Bilinear Pairings [PDF]

open access: yes, 2004
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a limited verifier, who will try to preserve the privacy of the signer if the signer follows some specified rules. Also, the limited verifier can provide a proof to convince a
Chen, XF Chen, Xiaofeng   +2 more
openaire   +1 more source

Certificateless strong designated verifier multi-signature

open access: yesTongxin xuebao, 2016
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj   +2 more sources

A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings

open access: yesIEEE Access, 2018
Certificateless public key cryptosystem (CLPKC) is a desirable cryptographic system because it refrains from both certificate management and key escrow. In CLPKC, how to revoke a misbehaving or compromised user is an important issue.
Hongzhen Du, QiaoYan Wen, Shanshan Zhang
doaj   +1 more source

Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings

open access: yesIEEE Access, 2020
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj   +1 more source

On $5$-manifolds with free fundamental group and simple boundary links in $S^5$

open access: yes, 2017
We classify compact oriented $5$-manifolds with free fundamental group and $\pi_{2}$ a torsion free abelian group in terms of the second homotopy group considered as $\pi_1$-module, the cup product on the second cohomology of the universal covering, and ...
Kreck, Matthias, Su, Yang
core   +1 more source

Home - About - Disclaimer - Privacy