Results 41 to 50 of about 94,999 (279)

The random oracle model: a twenty-year retrospective [PDF]

open access: yesDesigns, Codes and Cryptography, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Koblitz, Neal, Menezes, Alfred J.
openaire   +1 more source

Attacks on One Designated Verifier Proxy Signature Scheme

open access: yesJournal of Applied Mathematics, 2012
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier.
Baoyuan Kang
doaj   +1 more source

A New Certificateless Aggregate Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj   +1 more source

How Risky Is the Random-Oracle Model? [PDF]

open access: yes, 2009
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instantiations proposed in the literature for such cases are weaker than a random oracle, including the proposals by Bellare and Rogaway from 1993 and 1996, and the ones implicit in ...
Gaëtan Leurent, Phong Q. Nguyen
openaire   +1 more source

A Secure User Authentication Protocol for Heterogeneous Mobile Environments

open access: yesIEEE Access, 2022
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications.
Alzubair Hassan   +7 more
doaj   +1 more source

Tail index estimation, concentration and adaptivity [PDF]

open access: yes, 2015
This paper presents an adaptive version of the Hill estimator based on Lespki's model selection method. This simple data-driven index selection method is shown to satisfy an oracle inequality and is checked to achieve the lower bound recently derived by ...
Boucheron, Stéphane, Thomas, Maud
core   +3 more sources

Oracle inequalities for weighted group lasso in high-dimensional misspecified Cox models

open access: yesJournal of Inequalities and Applications, 2020
We study the nonasymptotic properties of a general norm penalized estimator, which include Lasso, weighted Lasso, and group Lasso as special cases, for sparse high-dimensional misspecified Cox models with time-dependent covariates.
Yijun Xiao   +3 more
doaj   +1 more source

Certificateless signature scheme without random oracles

open access: yesTongxin xuebao, 2015
The security of certificateless signature schemes can be proved under the random oracle model.However,any implementation of the random oracle may result in insecure schemes.Some certificateless signature schemes without random oracles are not secure ...
Yan-qiong LI, Ji-guo LI, Yi-chen ZHANG
doaj   +2 more sources

A Private Quantum Bit String Commitment

open access: yesEntropy, 2020
We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message.
Mariana Gama, Paulo Mateus, André Souto
doaj   +1 more source

Universally Composable Oblivious Transfer with Low Communication

open access: yesApplied Sciences, 2023
In this paper, a universally composable 1-out-of-N oblivious transfer protocol with low communication is built. This protocol obtained full simulation security based on the modulo learning with rounding (Mod-LWR) assumption.
Jiashuo Song   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy