搜索结果: 1-15 共查到“军事学 aggregate”相关记录42条 . 查询时间(0.093 秒)
Fast Authentication from Aggregate Signatures with Improved Security
Authentication Digital signatures Universal forgery
font style='font-size:12px;'>
2018/11/30
An attempt to derive signer-efficient digital signatures from aggregate signatures was made in a signature scheme referred to as Structure-free Compact Rapid Authentication (SCRA) (IEEE TIFS 2017). In...
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble
Mimblewimble Bitcoin commitments
font style='font-size:12px;'>
2018/11/2
Mimblewimble is an electronic cash system proposed by an anonymous author in 2016. It combines several privacy-enhancing techniques initially envisioned for Bitcoin, such as Confidential Transactions ...
Non-adaptive Group-Testing Aggregate MAC Scheme
message authentication aggregate group testing
font style='font-size:12px;'>
2018/5/22
This paper applies non-adaptive group testing to aggregate message authentication code (MAC) and introduces non-adaptive group-testing aggregate MAC. After formalization of its syntax and security req...
Synchronized Aggregate Signatures from the RSA Assumption
signatures aggregate RSA
font style='font-size:12px;'>
2018/1/25
In this work we construct efficient aggregate signatures from the RSA assumption in the synchronized setting. In this setting, the signing algorithm takes as input a (time) period tt as well the secre...
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
Aggregate signatures trapdoor permutations ideal cipher model
font style='font-size:12px;'>
2018/1/19
We give a framework for trapdoor-permutation-based sequential aggregate signatures (SAS) that unifies and simplifies prior work and leads to new results. The framework is based on ideal ciphers over l...
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Sequential Aggregate Signatures Fault-Tolerance Secure Logging
font style='font-size:12px;'>
2017/9/28
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where...
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions
intersection-sum Attributing Aggregate Ad Conversions
font style='font-size:12px;'>
2017/8/2
In this work, we consider the Intersection-Sum problem: two parties hold datasets containing user identifiers, and the second party additionally has an integer value associated with each user identifi...
Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
Searchable Encryption Access Control Data Privacy
font style='font-size:12px;'>
2017/4/17
Fine-grained access control, especially in shared data environments such as the cloud, is a common scenario. Suppose a data owner encrypts and stores a collection of NN documents in the cloud, and wis...
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Identity-based Signatures Sequential Aggregate Signatures the CDH Assumption
font style='font-size:12px;'>
2017/4/12
Identity-based sequential aggregate signature (IBSAS) schemes are usually applied to secure network routing and sensor networks, since they allow multiple signers to sequentially produce a short signa...
Cryptanalysis of a certificateless aggregate signature scheme
public-key cryptography C4I
font style='font-size:12px;'>
2016/12/26
Recently, Nie et al. proposed a certificateless aggregate signature scheme. In the standard security model considered in certificateless cryptography, we are dealing with two types of adversaries. In ...
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
conditional privacy-preserving vehicular sensor networks
font style='font-size:12px;'>
2016/7/15
Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J. Horng et al., An efficient certificatele...
Identity-Based Key Aggregate Cryptosystem from Multilinear Maps
Key-Aggregate Cryptosystem Identity-based Online Data Sharing
font style='font-size:12px;'>
2016/7/14
The key-aggregate cryptosystem (KAC) proposed by Chu et al. in 2014 offers a solution
to the flexible access delegation problem in shared data environments such as the cloud.
KAC allows a data owner...
MQSAS - A Multivariate Sequential Aggregate Signature Scheme
Multivariate Cryptography HFEv- Sequential Aggregate Signatures
font style='font-size:12px;'>
2016/5/24
(Sequential) Aggregate signature schemes enable a group of users u1,…,uk with messages m1,…,mk to produce a single signature Σ which states the integrity and authenticity of all the messages m1,…,mk. ...
Certicateless Aggregate Short Signature Scheme
Bilinear map Aggregation Digital signature
font style='font-size:12px;'>
2016/3/18
An aggregate signature scheme is the aggregation of multiple signatures
into a single compact signature of short string that can convince to any arbitrary
verifier participating in the scheme. The a...
Fault-Tolerant Aggregate Signatures
Aggregate Signatures Fault-Tolerance Cover-free Family
font style='font-size:12px;'>
2016/1/27
Aggregate signature schemes allow for the creation of a short
aggregate of multiple signatures. This feature leads to significant reductions
of bandwidth and storage space in sensor networks, secure...