Results 21 to 30 of about 4,491,165 (327)

Indifferentiable hash functions in the standard model

open access: yesIET Information Security, 2021
Indifferentiability of iterated hash functions is seen as evidence that there are no structural flaws in the iteration structure of the algorithm. However, it is often overlooked that such considerations only hold in the random oracle model and do not ...
Juha Partala
doaj   +1 more source

Quantum Search Approaches to Sampling-Based Motion Planning

open access: yesIEEE Access, 2023
In this paper, we present a novel formulation of traditional sampling-based motion planners as database-oracle structures that can be solved via quantum search algorithms.
Paul Lathrop   +2 more
doaj   +1 more source

Tightly Secure PKE Combiner in the Quantum Random Oracle Model

open access: yesCryptography, 2022
The development of increasingly sophisticated quantum computers poses a long-term threat to current cryptographic infrastructure. This has spurred research into both quantum-resistant algorithms and how to safely transition real-world implementations and
Brian Goncalves, Atefeh Mashatan
doaj   +1 more source

Infinite Computations with Random Oracles [PDF]

open access: yesNotre Dame Journal of Formal Logic, 2017
We consider the following problem for various infinite time machines. If a real is computable relative to large set of oracles such as a set of full measure or just of positive measure, a comeager set, or a nonmeager Borel set, is it already computable?
Schlicht, Philipp, Carl, Merlin
openaire   +4 more sources

A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries [PDF]

open access: yesJournal of Universal Computer Science, 2019
Recently, in order to guarantee security against quantum adversaries, several identification (ID) schemes based on computational problems which are supposed to be hard even for quantum computers have been proposed. However, their security are only proven
Bagus Santoso, Chunhua Su
doaj   +3 more sources

Identity-Based Partially Blind Signature Scheme: Cryptanalysis and Construction

open access: yesIEEE Access, 2021
Blind signature is a special type of digital signature, the signer cannot see the specific content signed. However, blindness may cause users to abuse their rights.
Yuhong Jiang, Lunzhi Deng, Bingqin Ning
doaj   +1 more source

Efficient All-or-Nothing Public Key Encryption With Authenticated Equality Test

open access: yesIEEE Access, 2021
Public key encryption with equality test (PKEET for short) is a new cryptographic primitive which allows a proxy to check whether two ciphertexts encrypted under different public keys are of the same plaintext.
Zhi-Yan Zhao, Peng Zeng
doaj   +1 more source

An Improved Scheme for Blockchain Oracle Based on Schnorr Signature [PDF]

open access: yesJisuanji gongcheng
Blockchain oracle is a type of middleware that provides trustworthy guarantee for on-chain data, effectively addressing the trust problem of on- and off-chain data transmission.
Huaiyong CUI, Shaohua ZHANG, Chao LI, Bingrong DAI
doaj   +1 more source

Random Oracles in a Quantum World [PDF]

open access: yes, 2011
The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems.
C.H. Bennett   +25 more
core   +3 more sources

Quantum Random Oracle Model for Quantum Public-Key Encryption

open access: yesIEEE Access, 2019
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj   +1 more source

Home - About - Disclaimer - Privacy