Results 91 to 100 of about 5,707 (192)
Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf of the ring without revealing the signer’s identity. Whistle-blowers especially find this useful.
Geontae Noh, Ji Young Chun, Ik Rae Jeong
doaj +1 more source
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2013.Cataloged from PDF version of thesis.Includes bibliographical references (p.
Ivan, Ioana (Ioana Elisabeta)
core
Anonymous reputation based reservations in e-commerce (AMNESIC) [PDF]
Online reservation systems have grown over the last recent years to facilitate the purchase of goods and services. Generally, reservation systems require that customers provide some personal data to make a reservation effective.
Rifà Pous, Helena
core
ID-based transitive signature schemes without random oracle
Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s ...
MA Xiao-long1 +4 more
doaj +2 more sources
Lattice-based verifiably encrypted group signatures
Verifiably encrypted signature (VES) schemes are extensively utilized in fair exchange which combine the features of encryption and signature, aiming to provide a solution that can not only verify the validity of signatures but also safeguard the privacy
Peidong Guan, Shuai Wang
doaj +1 more source
A Strongly Unforgeable Homomorphic MAC over Integers
Homomorphic MAC is a cryptographic primitive which protects authenticity of data, while allowing homomorphic evaluation of such protected data. In this paper, we present a new homomorphic MAC, which is based on integers, relying only on the existence of secure PRFs, and having efficiency comparable to the practical Catalano-Fiore homomorphic MAC.
Joo, Chihong, Yun, Aaram
openaire +3 more sources
Communicating Unforgiveness: How Do Victims Communicate Their Unforgiveness to Their Offenders?
When faced with interpersonal transgressions, some victims maintain unforgiveness towards their offenders. Researchers have identified emotions and cognitions experienced by victims who maintain unforgiveness, but the literature has yet to move beyond investigating the intrapersonal experience of unforgiveness.
openaire +1 more source
Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity
Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG
doaj +2 more sources
User-Mediated Authentication Protocols and Unforgeability in Key Collision
This research provides a computational analysis of the ISO 9798-6 standard’s Mechanism 7a authentication protocol. In contrast to typical authentication protocols, ISO 9798-6 mechanism 7a requires user interaction and aims to authenticate data possession instead of identities. Consequently, we introduce a 3-party possession user mediated authentication
openaire +2 more sources
Lattice-based verifiable timed signature and application
Aiming at the problem that current verifiable timed signature (VTS) schemes cannot effectively resist the threat of quantum computing attacks, a lattice-based verifiable timed signature (LVTS) scheme was proposed, founded on challenging problems over ...
CHEN Huiyan +4 more
doaj

