Results 201 to 210 of about 121,764 (250)
Broadband Achromatic Programmable Electromagnetic Camouflage via Fluidic-Accessible Metasurface. [PDF]
Liu S +14 more
europepmc +1 more source
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme. [PDF]
Wei Z, Lan G, Zhao H, Li Z, Ju Z.
europepmc +1 more source
Exploring targeted therapy in retinal vasculopathy with cerebral leukoencephalopathy: a case report and review of literature. [PDF]
Tato-Moreno P +7 more
europepmc +1 more source
Disulfidptosis-related genes signature predicts prognosis and immune microenvironment in colon cancer. [PDF]
Jiang W, Yang H, Li R, Li Y, Xia S.
europepmc +1 more source
Threshold Ring Signature Scheme based on the Curve
openaire
Some of the next articles are maybe not open access.
Related searches:
Related searches:
An efficient multivariate threshold ring signature scheme
Computer Standards & Interfaces, 2021Abstract At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with security reduction to the MQ problem and impersonation probability 2 3 . Petzoldt et al. (AAECC 2013) extended that protocol into a threshold ring signature scheme, which later was improved by Zhang and Zhao (NSS 2014).
Dung H. Duong +3 more
openaire +4 more sources
Cryptanalysis of multivariate threshold ring signature schemes
Information Processing Letters, 2023In this note, the authors provide an attack on the anonymity of three multivariate threshold ring signatures. First, the authors provide the necessary background for understanding the building blocks needed to analyze multivariate threshold ring signatures. An important point to note is that after \(t\) or more users sign a message, a combiner computes
Satyam Omar +2 more
openaire +4 more sources
Certificateless Threshold Ring Signature
Information Sciences, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
chang, shuang +3 more
openaire +4 more sources
An efficient code-based threshold ring signature scheme
Journal of Information Security and Applications, 2019Abstract Code based cryptography is a powerful and a promising alternative to the number theoretic cryptography as it is supposed to resist to the quantum computer. The migration to the post quantum hypothetical world requires the design of all the most important cryptographic primitives such as signature schemes.
Hafsa Assidi +2 more
openaire +3 more sources

