Results 91 to 100 of about 5,707 (192)

Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model

open access: yesJournal of Applied Mathematics, 2014
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf of the ring without revealing the signer’s identity. Whistle-blowers especially find this useful.
Geontae Noh, Ji Young Chun, Ik Rae Jeong
doaj   +1 more source

Functional signatures [PDF]

open access: yes, 2013
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2013.Cataloged from PDF version of thesis.Includes bibliographical references (p.
Ivan, Ioana (Ioana Elisabeta)
core  

Anonymous reputation based reservations in e-commerce (AMNESIC) [PDF]

open access: yes, 2011
Online reservation systems have grown over the last recent years to facilitate the purchase of goods and services. Generally, reservation systems require that customers provide some personal data to make a reservation effective.
Rifà Pous, Helena
core  

ID-based transitive signature schemes without random oracle

open access: yesTongxin xuebao, 2010
Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s ...
MA Xiao-long1   +4 more
doaj   +2 more sources

Lattice-based verifiably encrypted group signatures

open access: yesCybersecurity
Verifiably encrypted signature (VES) schemes are extensively utilized in fair exchange which combine the features of encryption and signature, aiming to provide a solution that can not only verify the validity of signatures but also safeguard the privacy
Peidong Guan, Shuai Wang
doaj   +1 more source

A Strongly Unforgeable Homomorphic MAC over Integers

open access: yesJournal of the Korea Institute of Information Security and Cryptology, 2014
Homomorphic MAC is a cryptographic primitive which protects authenticity of data, while allowing homomorphic evaluation of such protected data. In this paper, we present a new homomorphic MAC, which is based on integers, relying only on the existence of secure PRFs, and having efficiency comparable to the practical Catalano-Fiore homomorphic MAC.
Joo, Chihong, Yun, Aaram
openaire   +3 more sources

Communicating Unforgiveness: How Do Victims Communicate Their Unforgiveness to Their Offenders?

open access: yes
When faced with interpersonal transgressions, some victims maintain unforgiveness towards their offenders. Researchers have identified emotions and cognitions experienced by victims who maintain unforgiveness, but the literature has yet to move beyond investigating the intrapersonal experience of unforgiveness.
openaire   +1 more source

Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity

open access: yesTongxin xuebao, 2015
Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG
doaj   +2 more sources

User-Mediated Authentication Protocols and Unforgeability in Key Collision

open access: yesInternational Journal of Information Security, 2018
This research provides a computational analysis of the ISO 9798-6 standard’s Mechanism 7a authentication protocol. In contrast to typical authentication protocols, ISO 9798-6 mechanism 7a requires user interaction and aims to authenticate data possession instead of identities. Consequently, we introduce a 3-party possession user mediated authentication
openaire   +2 more sources

Lattice-based verifiable timed signature and application

open access: yesTongxin xuebao
Aiming at the problem that current verifiable timed signature (VTS) schemes cannot effectively resist the threat of quantum computing attacks, a lattice-based verifiable timed signature (LVTS) scheme was proposed, founded on challenging problems over ...
CHEN Huiyan   +4 more
doaj  

Home - About - Disclaimer - Privacy