Results 31 to 40 of about 95,474 (182)

How Risky Is the Random-Oracle Model? [PDF]

open access: yes, 2009
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instantiations proposed in the literature for such cases are weaker than a random oracle, including the proposals by Bellare and Rogaway from 1993 and 1996, and the ones implicit in ...
Gaëtan Leurent, Phong Q. Nguyen
openaire   +1 more source

Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj   +1 more source

On the robustness of bucket brigade quantum RAM [PDF]

open access: yes, 2015
We study the robustness of the bucket brigade quantum random access memory model introduced by Giovannetti, Lloyd, and Maccone [Phys. Rev. Lett. 100, 160501 (2008)]. Due to a result of Regev and Schiff [ICALP '08 pp.
Arunachalam S   +15 more
core   +2 more sources

A New Certificateless Aggregate Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj   +1 more source

Certificateless signature scheme without random oracles

open access: yesTongxin xuebao, 2015
The security of certificateless signature schemes can be proved under the random oracle model.However,any implementation of the random oracle may result in insecure schemes.Some certificateless signature schemes without random oracles are not secure ...
Yan-qiong LI, Ji-guo LI, Yi-chen ZHANG
doaj   +2 more sources

A Secure User Authentication Protocol for Heterogeneous Mobile Environments

open access: yesIEEE Access, 2022
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications.
Alzubair Hassan   +7 more
doaj   +1 more source

Oracle inequalities for weighted group lasso in high-dimensional misspecified Cox models

open access: yesJournal of Inequalities and Applications, 2020
We study the nonasymptotic properties of a general norm penalized estimator, which include Lasso, weighted Lasso, and group Lasso as special cases, for sparse high-dimensional misspecified Cox models with time-dependent covariates.
Yijun Xiao   +3 more
doaj   +1 more source

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]

open access: yes, 2009
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert   +15 more
core   +5 more sources

A Private Quantum Bit String Commitment

open access: yesEntropy, 2020
We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message.
Mariana Gama, Paulo Mateus, André Souto
doaj   +1 more source

Universally Composable Oblivious Transfer with Low Communication

open access: yesApplied Sciences, 2023
In this paper, a universally composable 1-out-of-N oblivious transfer protocol with low communication is built. This protocol obtained full simulation security based on the modulo learning with rounding (Mod-LWR) assumption.
Jiashuo Song   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy