Results 101 to 110 of about 5,816 (214)

A Strongly Unforgeable Homomorphic MAC over Integers

open access: yesJournal of the Korea Institute of Information Security and Cryptology, 2014
Homomorphic MAC is a cryptographic primitive which protects authenticity of data, while allowing homomorphic evaluation of such protected data. In this paper, we present a new homomorphic MAC, which is based on integers, relying only on the existence of secure PRFs, and having efficiency comparable to the practical Catalano-Fiore homomorphic MAC.
Joo, Chihong, Yun, Aaram
openaire   +3 more sources

Communicating Unforgiveness: How Do Victims Communicate Their Unforgiveness to Their Offenders?

open access: yes
When faced with interpersonal transgressions, some victims maintain unforgiveness towards their offenders. Researchers have identified emotions and cognitions experienced by victims who maintain unforgiveness, but the literature has yet to move beyond investigating the intrapersonal experience of unforgiveness.
openaire   +1 more source

Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity

open access: yesTongxin xuebao, 2015
Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG
doaj   +2 more sources

User-Mediated Authentication Protocols and Unforgeability in Key Collision

open access: yesInternational Journal of Information Security, 2018
This research provides a computational analysis of the ISO 9798-6 standard’s Mechanism 7a authentication protocol. In contrast to typical authentication protocols, ISO 9798-6 mechanism 7a requires user interaction and aims to authenticate data possession instead of identities. Consequently, we introduce a 3-party possession user mediated authentication
openaire   +2 more sources

SIGNCRYPTION ANALYZE [PDF]

open access: yes
The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption.
Laura Savu
core  

Unforgeable Quantum Encryption

open access: green, 2017
Gorjan Alagic   +2 more
openalex   +1 more source

Lattice-based verifiable timed signature and application

open access: yesTongxin xuebao
Aiming at the problem that current verifiable timed signature (VTS) schemes cannot effectively resist the threat of quantum computing attacks, a lattice-based verifiable timed signature (LVTS) scheme was proposed, founded on challenging problems over ...
CHEN Huiyan   +4 more
doaj  

Home - About - Disclaimer - Privacy