Results 181 to 190 of about 90,649 (207)
Some of the next articles are maybe not open access.
Security Analysis Based on Quantum Random Oracle Model
2020Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible random oracle for post-quantum cryptography and quantum random oracle for quantum cryptography.
Jianwei Liu, Tao Shang
openaire +2 more sources
Selectively Convertible Authenticated Encryption in the Random Oracle Model
The Computer Journal, 2007Conventionally, a verified digital signature releases information about both the signing event and the signed content simultaneously, where the signing event proves the truth that someone actually signed something. However, in many cases, the information of the signing event and the signed content have different uses and distinct degrees of importance ...
openaire +2 more sources
Securing “Encryption + Proof of Knowledge” in the Random Oracle Model [PDF]
To create encryption schemes that offer security against adaptive chosen ciphertext attacks, this paper shows how to securely combine a simple encryption scheme with a proof of knowledge made noninteractive with a hash function. A typical example would be combining the ElGamal encryption scheme with the Schnorr signature scheme.
openaire +1 more source
IBE in Adaptive-Identity Model Without Random Oracles
2011In the previous chapters, we have seen several IBE schemes and their extension to HIBE. As mentioned in Chapter 2, the security model for IBE schemes was introduced by Boneh and Franklin and allows the adversary to make both adaptiveidentity and adaptive-chosen ciphertext attacks.
Palash Sarkar, Sanjit Chatterjee
openaire +2 more sources
Secure Stern Signatures in Quantum Random Oracle Model
2019The Stern signatures are a class of lattice-based signatures constructed from Stern protocols, a special class of sigma protocols, admitting diverse functionalities with good asymptotic efficiency. However, the post-quantum security of existing Stern signatures is unclear, since they are built via the Fiat-Shamir transformation, which has not been ...
Qianhong Wu, Hanwen Feng, Jianwei Liu
openaire +2 more sources
Fiat–Shamir Bulletproofs are Non-malleable (in the Random Oracle Model)
Journal of CryptologyBulletproofs (Bünz et al., in: 2018 IEEE symposium on security and privacy, IEEE Computer Society Press, pp 315–334, 2018) are a celebrated ZK proof system that allows for short and efficient proofs, and have been implemented and deployed in several real-world systems.
Ganesh, C+4 more
openaire +2 more sources
Antibody–drug conjugates: Smart chemotherapy delivery across tumor histologies
Ca-A Cancer Journal for Clinicians, 2022Paolo Tarantino+2 more
exaly
An overview of real‐world data sources for oncology and considerations for research
Ca-A Cancer Journal for Clinicians, 2022Lynne Penberthy+2 more
exaly
The biofilm life cycle: expanding the conceptual model of biofilm formation
Nature Reviews Microbiology, 2022Karin Sauer+2 more
exaly