Results 101 to 110 of about 5,816 (214)
A Strongly Unforgeable Homomorphic MAC over Integers
Homomorphic MAC is a cryptographic primitive which protects authenticity of data, while allowing homomorphic evaluation of such protected data. In this paper, we present a new homomorphic MAC, which is based on integers, relying only on the existence of secure PRFs, and having efficiency comparable to the practical Catalano-Fiore homomorphic MAC.
Joo, Chihong, Yun, Aaram
openaire +3 more sources
A verifiably encrypted signature scheme with strong unforgeability [PDF]
Jianhong Zhang
openalex +1 more source
Communicating Unforgiveness: How Do Victims Communicate Their Unforgiveness to Their Offenders?
When faced with interpersonal transgressions, some victims maintain unforgiveness towards their offenders. Researchers have identified emotions and cognitions experienced by victims who maintain unforgiveness, but the literature has yet to move beyond investigating the intrapersonal experience of unforgiveness.
openaire +1 more source
Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity
Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG
doaj +2 more sources
New Constructions of Existential Unforgeable Aggregate Signature Scheme from CSP [PDF]
Bo Mi +4 more
openalex +1 more source
User-Mediated Authentication Protocols and Unforgeability in Key Collision
This research provides a computational analysis of the ISO 9798-6 standard’s Mechanism 7a authentication protocol. In contrast to typical authentication protocols, ISO 9798-6 mechanism 7a requires user interaction and aims to authenticate data possession instead of identities. Consequently, we introduce a 3-party possession user mediated authentication
openaire +2 more sources
Unforgeable Digital Signature Integrated into Lightweight Encryption Based on Effective ECDH for Cybersecurity Mechanism in Internet of Things [PDF]
Adel A. Ahmed, Omar Barukab
openalex +1 more source
The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption.
Laura Savu
core
Lattice-based verifiable timed signature and application
Aiming at the problem that current verifiable timed signature (VTS) schemes cannot effectively resist the threat of quantum computing attacks, a lattice-based verifiable timed signature (LVTS) scheme was proposed, founded on challenging problems over ...
CHEN Huiyan +4 more
doaj

