Results 71 to 80 of about 5,816 (214)
Quantum money with nearly optimal error tolerance
We present a family of quantum money schemes with classical verification which display a number of benefits over previous proposals. Our schemes are based on hidden matching quantum retrieval games and they tolerate noise up to 23%, which we conjecture ...
Amiri, Ryan, Arrazola, Juan Miguel
core +1 more source
Generic Transformation to Strongly Unforgeable Signatures [PDF]
Recently, there are several generic transformation techniques proposed for converting unforgeable signature schemes (the message in the forgery has not been signed yet) into strongly unforgeable ones (the message in the forgery could have been signed previously). Most of the techniques are based on trapdoor hash functions and all of them require adding
Qiong Huang, Duncan S. Wong, Yiming Zhao
openaire +1 more source
Constructing Efficient Identity‐Based Signatures on Lattices
In this work, we explore the recent developments related to lattice‐based signature and preimage sampling, and specify a compact identity‐based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher ...
Huiwen Jia +4 more
wiley +1 more source
ID-based server-aided verification signature scheme with strong unforgeability
Most identity-based signature schemes in the standard model are existentially unforgeable,which cannot prevent adversaries from forging valid signatures on messages that have previously been signed.However,signature verification algorithms of ID-based ...
Xiao-dong YANG +5 more
doaj +2 more sources
Analysis and improvement of an identity-based signature scheme from lattices
Liu et al proposed an identity-based signature from lattices in 2013,and proved that it can achieve strong un-forgeability in the standard model.Through analysis,the security proof of this scheme has some defect,and then show that the scheme cannot prove
ANGChun-li Y +4 more
doaj +2 more sources
Implementation vulnerabilities in general quantum cryptography
Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of ...
Andersson, Erika +3 more
core +1 more source
A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang +5 more
wiley +1 more source
Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession
With the widespread popularity of cloud storage, cloud storage security issues have also received much attention. A provable data possession (PDP) scheme can effectively help users to verify the integrity of data stored remotely in the cloud.
Junfeng Tian, Guo Ruifang, Xuan Jing
doaj +1 more source
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [PDF]
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers.
Emura, Keita +3 more
core
Leveraging dual‐blockchain collaboration for logistics supply chain supervision
Logistics supply chains record transactions but face issues with privacy and supervision on the blockchain, a dual‐blockchain scheme is proposed with a supervision chain and management approach to enable efficient cross‐chain collaboration while preventing data leakage.
Licheng Lin +3 more
wiley +1 more source

