Results 11 to 20 of about 20,376 (274)

Efficient and Provably Secure Certificateless Signature Schemes [PDF]

open access: yesJisuanji gongcheng, 2016
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj   +1 more source

Provably Secure Steganography [PDF]

open access: yesIEEE Transactions on Computers, 2002
Informally, steganography is the process of sending a secret message from Alice to Bob in such a way that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In this work, we initiate the study of steganography from a complexity-theoretic point of view.
Nicholas Hopper   +2 more
openaire   +2 more sources

Symmetric private information retrieval supported by quantum-secure key-exchange network

open access: yesLight: Science & Applications, 2022
Quantum key distribution provides a provably secure way for private key distribution, which enables the practical implementation of information retrieval that preserves both the user privacy and database security.
Shuang Wang
doaj   +1 more source

Provable Secure Parallel Gadgets

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems, 2023
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One of the most prominent countermeasures against side-channel attacks is masking, where each intermediate value of the computation is secret shared, thereby concealing the computation’s sensitive information.
Francesco Berti   +2 more
openaire   +2 more sources

PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions [PDF]

open access: yes, 2013
Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions.
Chen, Zhili   +6 more
core   +1 more source

Privacy-Preserving Facial Recognition Using Biometric-Capsules [PDF]

open access: yes, 2020
Indiana University-Purdue University Indianapolis (IUPUI)In recent years, developers have used the proliferation of biometric sensors in smart devices, along with recent advances in deep learning, to implement an array of biometrics-based recognition ...
Phillips, Tyler S.
core   +1 more source

Practical and Provably Secure Distance-Bounding [PDF]

open access: yesJournal of Computer Security, 2015
AbstractFrom contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. In this paper, we present a formal analysis of SKI, which recently emerged as the first family of lightweight and provably secure distance bounding ...
Boureanu, Ioana   +2 more
openaire   +3 more sources

Provably secure social network privacy-preserving scheme

open access: yes网络与信息安全学报, 2016
A provable secure social network privacy-preserving scheme was proposed to solve the problem of social network privacy-preserving scheme's security proof.Firstly,through analyzing the security requirements about the node's privacy (indistinguishable node
Jian-qiong HE,You-liang TIAN, Kai ZHOU
doaj   +3 more sources

A Provably Secure Short Blind Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2019
In the wireless network environment,applications of blind signature such as digital cash, digital voting and digital invoice protection are challenged by limited transmission bandwidth,weak transmission capabilities and poor computing performance of ...
ZUO Liming, XIA Pingping, CHEN Zuosong
doaj   +1 more source

Provably Secure Experimental Quantum Bit-String Generation [PDF]

open access: yes, 2004
Coin tossing is a cryptographic task in which two parties who do not trust each other aim to generate a common random bit. Using classical communication this is impossible, but non trivial coin tossing is possible using quantum communication.
A. Kent   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy