Results 21 to 30 of about 10,318 (256)
Expanders and right-angled Artin groups
The purpose of this article is to give a characterization of families of expander graphs via right-angled Artin groups. We prove that a sequence of simplicial graphs $\{\Gamma_i\}_{i\in\mathbb{N}}$ forms a family of expander graphs if and only if a ...
Flores, Ramón +2 more
core +1 more source
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party.
Yitao Chen, Weiwei Han
doaj +1 more source
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties.
Xiwei Shan, Lin You, Gengran Hu
doaj +1 more source
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj +1 more source
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core +2 more sources
Limited Verifier Signature from Bilinear Pairings [PDF]
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a limited verifier, who will try to preserve the privacy of the signer if the signer follows some specified rules. Also, the limited verifier can provide a proof to convince a
Chen, XF Chen, Xiaofeng +2 more
openaire +1 more source
Certificateless strong designated verifier multi-signature
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj +2 more sources
A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings
Certificateless public key cryptosystem (CLPKC) is a desirable cryptographic system because it refrains from both certificate management and key escrow. In CLPKC, how to revoke a misbehaving or compromised user is an important issue.
Hongzhen Du, QiaoYan Wen, Shanshan Zhang
doaj +1 more source
Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj +1 more source
On $5$-manifolds with free fundamental group and simple boundary links in $S^5$
We classify compact oriented $5$-manifolds with free fundamental group and $\pi_{2}$ a torsion free abelian group in terms of the second homotopy group considered as $\pi_1$-module, the cup product on the second cohomology of the universal covering, and ...
Kreck, Matthias, Su, Yang
core +1 more source

