Results 1 to 10 of about 5,622 (140)

Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
In this paper we construct and consider a new group-based digital signature scheme with evolving secret key, which is built using a bilinear map. This map is an asymmetric pairing of Type 3, and although, for the reason of this paper, it is treated in a ...
Mariusz Jurkiewicz
doaj   +1 more source

Indifferentiable hash functions in the standard model

open access: yesIET Information Security, 2021
Indifferentiability of iterated hash functions is seen as evidence that there are no structural flaws in the iteration structure of the algorithm. However, it is often overlooked that such considerations only hold in the random oracle model and do not ...
Juha Partala
doaj   +1 more source

Tightly Secure PKE Combiner in the Quantum Random Oracle Model

open access: yesCryptography, 2022
The development of increasingly sophisticated quantum computers poses a long-term threat to current cryptographic infrastructure. This has spurred research into both quantum-resistant algorithms and how to safely transition real-world implementations and
Brian Goncalves, Atefeh Mashatan
doaj   +1 more source

Uselessness for an Oracle model with internal randomness [PDF]

open access: yesQuantum Information and Computation, 2014
We consider a generalization of the standard oracle model in which the oracle acts on the target with a permutation selected according to internal random coins. We describe several problems that are impossible to solve classically but can be solved by a quantum algorithm using a single query; we show that such infinity-vs-one separations between ...
Harrow, Aram W., Rosenbaum, David J.
openaire   +4 more sources

RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure

open access: yesSensors, 2022
The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have a significant impact on our daily lives.
Vikas Kumar   +5 more
doaj   +1 more source

Using intelligence techniques to automate Oracle testing [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2023
The software development life cycle includes software testing as a critical step. Oracle testing is necessary to determine if a particular test case detects an error because the purpose of testing is to ensure that the application adheres to its ...
Nour Sulaiman, safwan hasson
doaj   +1 more source

Quantum Depth in the Random Oracle Model

open access: yesProceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
We give a comprehensive characterization of the computational power of shallow quantum circuits combined with classical computation. Specifically, for classes of search problems, we show that the following statements hold, relative to a random oracle: (a) $\mathsf{BPP}^{\mathsf{QNC}^{\mathsf{BPP}}} \neq \mathsf{BQP}$.
Arora, Atul Singh   +5 more
openaire   +3 more sources

Quantum Random Oracle Model for Quantum Public-Key Encryption

open access: yesIEEE Access, 2019
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj   +1 more source

A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries [PDF]

open access: yesJournal of Universal Computer Science, 2019
Recently, in order to guarantee security against quantum adversaries, several identification (ID) schemes based on computational problems which are supposed to be hard even for quantum computers have been proposed. However, their security are only proven
Bagus Santoso, Chunhua Su
doaj   +3 more sources

A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
A group signature allows a group member who signs the message on behalf of the other group members. Any recipient also verifies the signature without knowing the signer.
Meryem Soysaldı Şahin, Sedat Akleylek
doaj   +1 more source

Home - About - Disclaimer - Privacy