Results 181 to 190 of about 90,649 (207)
Some of the next articles are maybe not open access.

Security Analysis Based on Quantum Random Oracle Model

2020
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible random oracle for post-quantum cryptography and quantum random oracle for quantum cryptography.
Jianwei Liu, Tao Shang
openaire   +2 more sources

Selectively Convertible Authenticated Encryption in the Random Oracle Model

The Computer Journal, 2007
Conventionally, a verified digital signature releases information about both the signing event and the signed content simultaneously, where the signing event proves the truth that someone actually signed something. However, in many cases, the information of the signing event and the signed content have different uses and distinct degrees of importance ...
openaire   +2 more sources

Securing “Encryption + Proof of Knowledge” in the Random Oracle Model [PDF]

open access: possible, 2002
To create encryption schemes that offer security against adaptive chosen ciphertext attacks, this paper shows how to securely combine a simple encryption scheme with a proof of knowledge made noninteractive with a hash function. A typical example would be combining the ElGamal encryption scheme with the Schnorr signature scheme.
openaire   +1 more source

IBE in Adaptive-Identity Model Without Random Oracles

2011
In the previous chapters, we have seen several IBE schemes and their extension to HIBE. As mentioned in Chapter 2, the security model for IBE schemes was introduced by Boneh and Franklin and allows the adversary to make both adaptiveidentity and adaptive-chosen ciphertext attacks.
Palash Sarkar, Sanjit Chatterjee
openaire   +2 more sources

Secure Stern Signatures in Quantum Random Oracle Model

2019
The Stern signatures are a class of lattice-based signatures constructed from Stern protocols, a special class of sigma protocols, admitting diverse functionalities with good asymptotic efficiency. However, the post-quantum security of existing Stern signatures is unclear, since they are built via the Fiat-Shamir transformation, which has not been ...
Qianhong Wu, Hanwen Feng, Jianwei Liu
openaire   +2 more sources

Fiat–Shamir Bulletproofs are Non-malleable (in the Random Oracle Model)

Journal of Cryptology
Bulletproofs (Bünz et al., in: 2018 IEEE symposium on security and privacy, IEEE Computer Society Press, pp 315–334, 2018) are a celebrated ZK proof system that allows for short and efficient proofs, and have been implemented and deployed in several real-world systems.
Ganesh, C   +4 more
openaire   +2 more sources

Antibody–drug conjugates: Smart chemotherapy delivery across tumor histologies

Ca-A Cancer Journal for Clinicians, 2022
Paolo Tarantino   +2 more
exaly  

An overview of real‐world data sources for oncology and considerations for research

Ca-A Cancer Journal for Clinicians, 2022
Lynne Penberthy   +2 more
exaly  

The biofilm life cycle: expanding the conceptual model of biofilm formation

Nature Reviews Microbiology, 2022
Karin Sauer   +2 more
exaly  

Colorectal cancer screening for average‐risk adults: 2018 guideline update from the American Cancer Society

Ca-A Cancer Journal for Clinicians, 2018
Timothy R Church   +2 more
exaly  

Home - About - Disclaimer - Privacy