Results 91 to 100 of about 5,816 (214)
Efficient Authenticated Encryption Schemes with Public Verifiability
An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with public verifiability.
Bao, Feng +3 more
core +2 more sources
With the wide spread of Bitcoin,block chain serving as the building block of digital currency becomes a hot spot in industry and academia.Due to the decentration of network,the unforgeability of block data,etc.,block chain has attracted more and more ...
Xin SHEN, Qing-qi PEI, Xue-feng LIU
doaj +3 more sources
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj +1 more source
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2013.Cataloged from PDF version of thesis.Includes bibliographical references (p.
Ivan, Ioana (Ioana Elisabeta)
core
Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns [PDF]
Man Zhou +7 more
openalex +1 more source
On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes [PDF]
A (computational) client puzzle scheme enables a client to prove to a server that a certain amount of computing resources (CPU cycles and/or Memory look-ups) has been dedicated to solve a puzzle.
Jeckmans, Arjan, Tang, Qiang
core +3 more sources
ID-based transitive signature schemes without random oracle
Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s ...
MA Xiao-long1 +4 more
doaj +2 more sources
Lattice-based verifiably encrypted group signatures
Verifiably encrypted signature (VES) schemes are extensively utilized in fair exchange which combine the features of encryption and signature, aiming to provide a solution that can not only verify the validity of signatures but also safeguard the privacy
Peidong Guan, Shuai Wang
doaj +1 more source
Deniable Ring Signatures [PDF]
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.Includes bibliographical references (p.
Reich, Eitan
core
Leveled Adaptively Strong-Unforgeable Identity-Based Fully Homomorphic Signatures [PDF]
Caifen Wang, Bin Wu, Hailong Yao
openalex +1 more source

