Results 21 to 30 of about 10,337 (237)
A concrete certificateless signature scheme without pairings [PDF]
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built
Chen, Shaozhen, Ge, Aijun, Huang, Xinyi
core +2 more sources
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party.
Yitao Chen, Weiwei Han
doaj +1 more source
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties.
Xiwei Shan, Lin You, Gengran Hu
doaj +1 more source
Expanders and right-angled Artin groups
The purpose of this article is to give a characterization of families of expander graphs via right-angled Artin groups. We prove that a sequence of simplicial graphs $\{\Gamma_i\}_{i\in\mathbb{N}}$ forms a family of expander graphs if and only if a ...
Flores, Ramón +2 more
core +1 more source
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj +1 more source
Limited Verifier Signature from Bilinear Pairings [PDF]
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a limited verifier, who will try to preserve the privacy of the signer if the signer follows some specified rules. Also, the limited verifier can provide a proof to convince a
Chen, XF Chen, Xiaofeng +2 more
openaire +1 more source
Balanced algebraic unknotting, linking forms, and surfaces in three- and four-space
We provide three 3-dimensional characterizations of the Z-slice genus of a knot, the minimum genus of a locally-flat surface in 4-space cobounding the knot whose complement has cyclic fundamental group: in terms of balanced algebraic unknotting, in terms
Feller, Peter, Lewark, Lukas
core +1 more source
Certificateless strong designated verifier multi-signature
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj +2 more sources
Integral operators and integral cohomology classes of Hilbert schemes [PDF]
The methods of integral operators on the cohomology of Hilbert schemes of points on surfaces are developed. They are used to establish integral bases for the cohomology groups of Hilbert schemes of points on a class of surfaces (and conjecturally, for ...
Qin, Zhenbo, Wang, Weiqiang
core +1 more source
A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings
Certificateless public key cryptosystem (CLPKC) is a desirable cryptographic system because it refrains from both certificate management and key escrow. In CLPKC, how to revoke a misbehaving or compromised user is an important issue.
Hongzhen Du, QiaoYan Wen, Shanshan Zhang
doaj +1 more source

