Results 91 to 100 of about 5,816 (214)

Efficient Authenticated Encryption Schemes with Public Verifiability

open access: yes, 2004
An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with public verifiability.
Bao, Feng   +3 more
core   +2 more sources

Survey of block chain

open access: yes网络与信息安全学报, 2016
With the wide spread of Bitcoin,block chain serving as the building block of digital currency becomes a hot spot in industry and academia.Due to the decentration of network,the unforgeability of block data,etc.,block chain has attracted more and more ...
Xin SHEN, Qing-qi PEI, Xue-feng LIU
doaj   +3 more sources

A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings

open access: yesJournal of Applied Mathematics, 2014
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj   +1 more source

Functional signatures [PDF]

open access: yes, 2013
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2013.Cataloged from PDF version of thesis.Includes bibliographical references (p.
Ivan, Ioana (Ioana Elisabeta)
core  

Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns [PDF]

open access: green, 2021
Man Zhou   +7 more
openalex   +1 more source

On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes [PDF]

open access: yes, 2010
A (computational) client puzzle scheme enables a client to prove to a server that a certain amount of computing resources (CPU cycles and/or Memory look-ups) has been dedicated to solve a puzzle.
Jeckmans, Arjan, Tang, Qiang
core   +3 more sources

ID-based transitive signature schemes without random oracle

open access: yesTongxin xuebao, 2010
Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s ...
MA Xiao-long1   +4 more
doaj   +2 more sources

Lattice-based verifiably encrypted group signatures

open access: yesCybersecurity
Verifiably encrypted signature (VES) schemes are extensively utilized in fair exchange which combine the features of encryption and signature, aiming to provide a solution that can not only verify the validity of signatures but also safeguard the privacy
Peidong Guan, Shuai Wang
doaj   +1 more source

Deniable Ring Signatures [PDF]

open access: yes, 2007
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.Includes bibliographical references (p.
Reich, Eitan
core  

Home - About - Disclaimer - Privacy