A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability [PDF]
Ensuring both cast-as-intended (CAI) verifiability and coercion-resistance in e-voting remains a critical challenge. The e-voting scheme proposed by Finogina and Herranz in 2023 represents the first notable advancement in reconciling these conflicting ...
Swee-Huay Heng +2 more
exaly +5 more sources
Logarithmic-Size Post-Quantum Linkable Ring Signatures Based on Aggregation Operations [PDF]
Linkable ring signatures are a type of ring signature scheme that can protect the anonymity of signers while allowing the public to verify whether the same signer has signed the same message multiple times.
Minghui Zheng +5 more
doaj +2 more sources
Unforgeable Quantum Encryption [PDF]
We study the problem of encrypting and authenticating quantum data in the presence of adversaries making adaptive chosen plaintext and chosen ciphertext queries. Classically, security games use string copying and comparison to detect adversarial cheating
A Ambainis +19 more
core +6 more sources
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model [PDF]
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard existential unforgeability. It requires that not only forging a signature on a new message is hard, it is infeasible as well to produce a new signature ...
Eaton, Edward, Song, Fang
core +6 more sources
Group signature with time-bound keys and unforgeability of expiry time for smart cities
Internet of Things (IoT) lays the foundation for the various applications in smart cities, yet resource-constrained IoT devices are prone to suffer from devastating cyberattacks and privacy leak threats, thus are inevitability supposed as the weakest ...
Tao Feng
exaly +2 more sources
Digital signature schemes with strong existential unforgeability [version 1; peer review: 2 approved] [PDF]
Digital signature schemes (DSS) are ubiquitously used for public authentication in the infrastructure of the internet, in addition to their use as a cryptographic tool to construct even more sophisticated schemes such as those that are identity-based ...
Jason Chia, Ji-Jian Chin, Sook-Chin Yip
doaj +3 more sources
Quantum-secure message authentication via blind-unforgeability [PDF]
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum ...
CH Bennett +17 more
core +4 more sources
Experimental investigation of practical unforgeable quantum money [PDF]
Wiesner's unforgeable quantum money scheme is widely celebrated as the first quantum information application. Based on the no-cloning property of quantum mechanics, this scheme allows for the creation of credit cards used in authenticated transactions ...
Bozzio, Mathieu +5 more
core +5 more sources
A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments
With the widespread application of the Internet of Things (IoT), ensuring communication security for IoT devices is of considerable importance. Since IoT data are vulnerable to eavesdropping, tampering, forgery, and other attacks during an open network ...
Xiao-Dong Yang, Xizhen Pei, Guilan Chen
exaly +3 more sources
Physical unclonable functions (PUFs) leverage inherent, nonclonable physical randomness to generate unique input-output pairs, serving as secure fingerprints for cryptographic protocols like authentication.
Holger Boche +2 more
exaly +4 more sources

