Results 1 to 10 of about 1,372,067 (201)
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. [PDF]
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme. While at a high level the scheme resembles the Schnorr blind signature, our work does not directly follow from that construction, since isogenies do ...
Katsumata S, Lai YF, LeGrow JT, Qin L.
europepmc +2 more sources
Lattice-based Blind Signatures [PDF]
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we present two efficient blind signature schemes based on hard worst-case lattice problems.
core +5 more sources
Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes [PDF]
A blind signature enables a user to obtain signatures on any message from an authority who cannot acquire any information on the message being signed. A blind ring signature scheme is designed as a ring signature scheme with the blindness property.
Kyung-Ah Shim, Youngjoo An
doaj +2 more sources
New Construction of Blind Signatures From Braid Groups
A new construction of a blind signature scheme based on braid groups is proposed. In the random oracle model, the proposed scheme is provably unforgeable against chosen message attacks, assuming that the one-more matching conjugate problem in braid ...
Licheng Wang +3 more
doaj +2 more sources
Security Arguments for Digital Signatures and Blind Signatures
This paper proves the security of a large class of signature schemes in the so-called random oracle model. This model assumes that the hash function used in a signature scheme behaves as a random function. However, it has been shown that there exist (contrived) schemes that are provably secure in the random oracle model, but not when used with a real ...
D. Pointcheval, J. Stern
semanticscholar +2 more sources
Security of Blind Signatures Revisited [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dominique Schröder, Dominique Unruh
semanticscholar +4 more sources
Vibration-Based Diagnostics of Rolling Element Bearings Using the Independent Component Analysis (ICA) Method [PDF]
This manuscript presents a study on the application of blind source separation (BSS) techniques, specifically the Independent Component Analysis (ICA) method, for the detection and identification of localized faults in rolling element bearings.
Dariusz Mika +2 more
doaj +2 more sources
Reality is two-fold, composed of the lighted world as revealed in Genesis, and the darker primordiality which preceded it. The illuminated represents that which the human mind can comprehend, manipulate and re-order to its will: a “designed” and ...
Thomas Crowther
doaj +3 more sources
Effect of Empagliflozin on the plasma lipidome in patients with type 2 diabetes mellitus: results from the EmDia clinical trial [PDF]
Background Sodium-glucose cotransporter 2 (SGLT2) inhibitors, such as Empagliflozin, are antidiabetic drugs that reduce glucose levels and have emerged as a promising therapy for patients with heart failure (HF), although the exact molecular mechanisms ...
Katrin I. Bauer +14 more
doaj +2 more sources
Location Privacy Protection Scheme Based on Database-Driven Cognitive Radio Network [PDF]
The growing number of wireless devices can result in a shortage of spectrum resources.Dynamic spectrum sharing provides a solution to the problem, but requires users to submit their location to the database to query the availability of spectrum, which ...
XU Xin, WEN Mi
doaj +1 more source

