搜索结果: 1-15 共查到“军事学 digital signatures”相关记录16条 . 查询时间(0.078 秒)
Digital Signatures for Consensus
blockchain multi-signature forward-security
font style='font-size:12px;'>
2019/3/11
We present a pairing-based signature scheme for use in blockchains that achieves substantial savings in bandwidth and storage requirements while providing strong security guarantees. Our signature sch...
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
Tight security digital signatures Fiat-Shamir
font style='font-size:12px;'>
2018/6/5
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose cryptographic parameters in a way that is supported by a security proof, without the need to sacrif...
On Composable Security for Digital Signatures
Digital Signatures Composable Security
font style='font-size:12px;'>
2018/1/12
A digital signature scheme (DSS), which consists of a key-generation, a signing, and a verification algorithm, is an invaluable tool in cryptography. The first and still most widely used security defi...
CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
digital signatures post-quantum cryptography implementations
font style='font-size:12px;'>
2017/6/28
This paper presents Dilithium, a lattice-based signature scheme that is part of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) package that will be submitted to the NIST call for post-quant...
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs
Signatures Kummer Curve25519
font style='font-size:12px;'>
2017/6/6
qDSA is a high-speed, high-security signature scheme that facilitates implementations with a very small memory footprint, a crucial requirement for embedded systems and IoT devices, and that uses the ...
Efficient Digital Signatures From Coding Theory
Signature Coding Theory Identification
font style='font-size:12px;'>
2017/5/11
The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following the framework detailed by Lyubashevsky t...
Quantum Tokens for Digital Signatures
Quantum cryptography digital signatures token
font style='font-size:12px;'>
2017/2/20
The fisherman caught a quantum fish. "Fisherman, please let me go", begged the fish, "and I will grant you three wishes". The fisherman agreed. The fish gave the fisherman a quantum computer, three qu...
Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings
lattice ideal lattice Ring-SIS
font style='font-size:12px;'>
2016/12/10
In this work, we show that the above may actually be possible. We construct a digital signature scheme based (in the random oracle model) on a simple adaptation of the Ring-SIS problem which is as har...
Digital Signatures from Symmetric-Key Primitives
post-quantum cryptography signatures block cipher
font style='font-size:12px;'>
2016/12/7
We propose practically efficient signature schemes which feature several attractive properties: (a) they only rely on the security of symmetric-key primitives (block ciphers, hash functions), and are ...
Blank Digital Signatures
Digital signature scheme blank digital signatures elliptic curves pairings polynomial commitments
font style='font-size:12px;'>
2013/4/18
In this paper we present a novel type of digital signatures, which we call blank digital signatures. The basic idea behind this scheme is that an originator can define and sign a message template, des...
On the Theory and Practice of Personal Digital Signatures
Personal Digital Signatures issuing digital signatures key-logging
font style='font-size:12px;'>
2009/6/12
We take a step towards a more realistic modeling of personal
digital signatures, where a human user, his mobile equipment, his PC and
a server are all considered as independent players in the protoc...
Provable Security of Digital Signatures in the Tamper-Proof Device Model
Provable Security Digital Signatures Tamper-Proof Device Model
font style='font-size:12px;'>
2009/6/5
Provable Security of Digital Signatures in the Tamper-Proof Device Model.
Practical Attacks on Digital Signatures Using MD5 Message Digest
collision hash function MD5
font style='font-size:12px;'>
2009/4/3
We use the knowledge of the single MD5 collision published by
Wang et al. [2] to show an example of a pair of binary self-extract packages
with equal MD5 checksums, whereas resulting extracted contr...
Tamper-Evident Digital Signatures;Protecting Certi¯cation Authorities Against Malware
covert channel subliminal channel tamper-evident undercover
font style='font-size:12px;'>
2009/2/8
We introduce the notion of tamper-evidence for digital signature generation in order to
defend against attacks aimed at covertly leaking secret information held by corrupted network nodes.
This is a...
Cryptanalysis on an Algorithm for Efficient Digital Signatures
Cryptanalysis Algorithm Efficient Digital Signatures
font style='font-size:12px;'>
2008/12/26
The total computation of the generation and verification of
personnel identification or digital signature is heavy. For many schemes of
them, the total computation is not less than hundreds of modul...