Results 1 to 10 of about 6,586,318 (243)
Non-Invertible Public Key Certificates [PDF]
Post-quantum public cryptosystems introduced so far do not define a scalable public key infrastructure for the quantum era. We demonstrate here a public certification system based on Lizama’s non-invertible key exchange protocol which can be used to ...
Luis Adrián Lizama-Perez +1 more
doaj +4 more sources
Split logarithm problem and a candidate for a post-quantum signature scheme [PDF]
A new form of the hidden discrete logarithm problem, called split logarithm problem, is introduced as primitive of practical post-quantum digital signature schemes, which is characterized in using two non-permutable elements $A$ and $B$ of a finite non-
A.A. Moldovyan, N.A. Moldovyan
doaj +1 more source
A new type of digital signature algorithms with a hidden group [PDF]
The known designs of digital signature schemes with a hidden group, which use finite non-commutative algebras as algebraic support, are based on the computational complexity of the so-called hidden discrete logarithm problem.
Dmitriy N. Moldovyan
doaj +1 more source
Since the original signature model did not account for the possible threat of the forging signature attack, the majority of existing multivariate polynomial public key based signature schemes are at risk of forging signatures by equivalent key attacks ...
Yongyan Hou +4 more
doaj +1 more source
Blockchain based system for transfer of funds through an e-Governance application [PDF]
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI +3 more
doaj +1 more source
A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma +1 more
doaj +1 more source
Blockchain Technology – Support for Collaborative Systems [PDF]
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj +1 more source
In recent years, the Internet of Things (IoT) trend has been adopted very quickly. The rapid growth of IoT has increased the need for physical access control systems (ACS) for IoT devices, especially for IoT devices containing confidential data or other
Wervyan Shalannanda +7 more
doaj +1 more source
Public-Key Encryption with Quantum Keys
This submission subsumes arXiv:2303.01143 and arXiv:2303 ...
Khashayar Barooti +6 more
openaire +2 more sources
A Comparison on Broadcast Encryption Schemes: A New Broadcast Encryption Scheme
In broadcast communication, the schemes in which encryption methods are employed are often used to transmit messages from a source to multiple users. There are three types of scheme categories: central, contributory and hybrid schemes.
BODUR, H., KARA, R.
doaj +1 more source

