Results 1 to 10 of about 5,747 (155)

A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability [PDF]

open access: goldPLoS ONE
Ensuring both cast-as-intended (CAI) verifiability and coercion-resistance in e-voting remains a critical challenge. The e-voting scheme proposed by Finogina and Herranz in 2023 represents the first notable advancement in reconciling these conflicting ...
Yun-Xing Kho   +3 more
doaj   +4 more sources

Group signature with time-bound keys and unforgeability of expiry time for smart cities [PDF]

open access: goldEURASIP Journal on Wireless Communications and Networking, 2021
Internet of Things (IoT) lays the foundation for the various applications in smart cities, yet resource-constrained IoT devices are prone to suffer from devastating cyberattacks and privacy leak threats, thus are inevitability supposed as the weakest ...
Junli Fang, Tao Feng
doaj   +2 more sources

Quantum-secure message authentication via blind-unforgeability [PDF]

open access: green, 2020
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum ...
CH Bennett   +17 more
core   +5 more sources

Logarithmic-Size Post-Quantum Linkable Ring Signatures Based on Aggregation Operations [PDF]

open access: yesEntropy
Linkable ring signatures are a type of ring signature scheme that can protect the anonymity of signers while allowing the public to verify whether the same signer has signed the same message multiple times.
Minghui Zheng   +5 more
doaj   +2 more sources

Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model [PDF]

open access: goldInternational Journal of Distributed Sensor Networks, 2016
The existing proxy signature schemes with the proxy revocation function are proven to be malleable and do not possess strong unforgeability. Motivated by these concerns, a new proxy signature scheme with fast revocation is proposed, and it can be proved ...
Liaojun Pang   +3 more
doaj   +2 more sources

Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model [PDF]

open access: green, 2015
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard existential unforgeability. It requires that not only forging a signature on a new message is hard, it is infeasible as well to produce a new signature ...
Eaton, Edward, Song, Fang
core   +5 more sources

A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments [PDF]

open access: goldSensors, 2019
With the widespread application of the Internet of Things (IoT), ensuring communication security for IoT devices is of considerable importance. Since IoT data are vulnerable to eavesdropping, tampering, forgery, and other attacks during an open network ...
Xiaodong Yang   +5 more
doaj   +2 more sources

Unforgeable Quantum Encryption [PDF]

open access: green, 2018
We study the problem of encrypting and authenticating quantum data in the presence of adversaries making adaptive chosen plaintext and chosen ciphertext queries. Classically, security games use string copying and comparison to detect adversarial cheating
A Ambainis   +19 more
core   +6 more sources

Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model [PDF]

open access: goldJournal of Applied Mathematics, 2014
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf of the ring without revealing the signer’s identity. Whistle-blowers especially find this useful.
Geontae Noh, Ji Young Chun, Ik Rae Jeong
doaj   +2 more sources

Digital signature schemes with strong existential unforgeability [version 1; peer review: 2 approved] [PDF]

open access: goldF1000Research, 2021
Digital signature schemes (DSS) are ubiquitously used for public authentication in the infrastructure of the internet, in addition to their use as a cryptographic tool to construct even more sophisticated schemes such as those that are identity-based ...
Jason Chia, Ji-Jian Chin, Sook-Chin Yip
doaj   +2 more sources

Home - About - Disclaimer - Privacy