Results 61 to 70 of about 95,474 (182)

Security analysis and improvement of a certificateless signcryption scheme

open access: yesTongxin xuebao, 2015
To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography ...
Zhen-guo ZHAO
doaj   +2 more sources

Empirical entropy, minimax regret and minimax risk

open access: yes, 2017
We consider the random design regression model with square loss. We propose a method that aggregates empirical minimizers (ERM) over appropriately chosen random subsets and reduces to ERM in the extreme case, and we establish sharp oracle inequalities ...
Rakhlin, Alexander   +2 more
core   +1 more source

Short Signatures in the Random Oracle Model [PDF]

open access: yes, 2002
We study how digital signature schemes can generate signatures as short as possible, in particular in the case where partial message recovery is allowed. We give a concrete proposition named OPSSR that achieves the lower bound for message expansion, and give an exact security proof of the scheme in the ideal cipher model.
openaire   +1 more source

Permutation-Based Hash Chains with Application to Password Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +1 more source

Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model

open access: yesTongxin xuebao, 2014
Certificate less sequential multi-signature scheme could resolve the problem of authentication of recommendation information transmitted through trust train.Qin yan-lin,et al proposed an efficient certificateless sequential multi-signature scheme,and ...
Yan XU   +3 more
doaj   +2 more sources

Certificateless

open access: yesJournal of King Saud University: Computer and Information Sciences, 2014
The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397].
Ziba Eslami, Nasrollah Pakniat
doaj   +1 more source

Pseudorandom Unitaries in the Haar Random Oracle Model

open access: yes
66 ...
Ananth, Prabhanjan   +3 more
openaire   +2 more sources

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]

open access: yes, 2017
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M.   +4 more
core   +1 more source

Double-sided: tight proofs for guessing games in the quantum random oracle model

open access: yesCybersecurity
The semi-classical One-Way to Hiding (SC-O2H) lemma given by Ambainis et al. (CRYPTO 2019) is a crucial technique to solve the reprogramming problem in the quantum random oracle model (QROM), which can lead to quadratically better bounds for many cases ...
Jiawei Bao, Jiangxia Ge, Rui Xue
doaj   +1 more source

Multi-User Security Bound for Mixed Filter Permutators in the Random Oracle Model

open access: yesIACR Transactions on Symmetric Cryptology
At Eurocrypt’16, Méaux et al. designed a construction for symmetric ciphers that can be efficiently evaluated with Fully Homomorphic Encryption, dubbed Filter Permutator. They also specify FLIP, a family of Filter Permutators.
Benoît Cogliati, Simon Demarty
doaj   +1 more source

Home - About - Disclaimer - Privacy