Results 71 to 80 of about 5,816 (214)

Quantum money with nearly optimal error tolerance

open access: yes, 2016
We present a family of quantum money schemes with classical verification which display a number of benefits over previous proposals. Our schemes are based on hidden matching quantum retrieval games and they tolerate noise up to 23%, which we conjecture ...
Amiri, Ryan, Arrazola, Juan Miguel
core   +1 more source

Generic Transformation to Strongly Unforgeable Signatures [PDF]

open access: yes, 2007
Recently, there are several generic transformation techniques proposed for converting unforgeable signature schemes (the message in the forgery has not been signed yet) into strongly unforgeable ones (the message in the forgery could have been signed previously). Most of the techniques are based on trapdoor hash functions and all of them require adding
Qiong Huang, Duncan S. Wong, Yiming Zhao
openaire   +1 more source

Constructing Efficient Identity‐Based Signatures on Lattices

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In this work, we explore the recent developments related to lattice‐based signature and preimage sampling, and specify a compact identity‐based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher ...
Huiwen Jia   +4 more
wiley   +1 more source

ID-based server-aided verification signature scheme with strong unforgeability

open access: yesTongxin xuebao, 2016
Most identity-based signature schemes in the standard model are existentially unforgeable,which cannot prevent adversaries from forging valid signatures on messages that have previously been signed.However,signature verification algorithms of ID-based ...
Xiao-dong YANG   +5 more
doaj   +2 more sources

Analysis and improvement of an identity-based signature scheme from lattices

open access: yesTongxin xuebao, 2015
Liu et al proposed an identity-based signature from lattices in 2013,and proved that it can achieve strong un-forgeability in the standard model.Through analysis,the security proof of this scheme has some defect,and then show that the scheme cannot prove
ANGChun-li Y   +4 more
doaj   +2 more sources

Implementation vulnerabilities in general quantum cryptography

open access: yes, 2018
Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of ...
Andersson, Erika   +3 more
core   +1 more source

A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang   +5 more
wiley   +1 more source

Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession

open access: yesIEEE Access, 2019
With the widespread popularity of cloud storage, cloud storage security issues have also received much attention. A provable data possession (PDP) scheme can effectively help users to verify the integrity of data stored remotely in the cloud.
Junfeng Tian, Guo Ruifang, Xuan Jing
doaj   +1 more source

Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [PDF]

open access: yes, 2014
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers.
Emura, Keita   +3 more
core  

Leveraging dual‐blockchain collaboration for logistics supply chain supervision

open access: yesIET Blockchain, Volume 4, Issue S1, Page 570-585, December 2024.
Logistics supply chains record transactions but face issues with privacy and supervision on the blockchain, a dual‐blockchain scheme is proposed with a supervision chain and management approach to enable efficient cross‐chain collaboration while preventing data leakage.
Licheng Lin   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy