搜索结果: 1-15 共查到“军队指挥学 Based Signature Scheme”相关记录18条 . 查询时间(0.078 秒)
A Modified pqsigRM: RM Code-Based Signature Scheme
Code-based cryptography Courtois Finiasz
2019/6/12
We propose a novel signature scheme based on a modified Reed--Muller (RM) code, which reduces the signing complexity and key size compared to existing code-based signature schemes. This cheme is calle...
A Server-Assisted Hash-Based Signature Scheme
digital signatures hash functions public-key cryptography
2019/6/10
We present a practical digital signature scheme built from a cryptographic hash function and a hash-then-publish digital time- stamping scheme. We also provide a simple proof of existential unforgeabi...
A Blockchain-Assisted Hash-Based Signature Scheme
digital signatures hash functions public-key cryptography
2019/6/10
We present a server-supported, hash-based digital signature scheme. To achieve greater efficiency than current state of the art, we relax the security model somewhat. We postulate a set of design requ...
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019
RQCS digital signatures cryptanalysis
2019/2/27
Song, Huang, Mu, and Wu proposed a new code-based signature scheme, the Rank Quasi-Cyclic Signature (RQCS) scheme (PKC 2019, Cryptology ePrint Archive 2019/053), which is based on an IND-CCA2 KEM sche...
A New Code-based Signature Scheme with Shorter Public Key
Post-Quantum Cryptography Rank Metric Codes Digital Signatures
2019/1/26
Code-based signature has been believed to be a useful authentication tool for post-quantum cryptography. There have been some attempts to construct efficient code-based signatures; however, existing c...
We describe a variation of the Schnorr-Lyubashevsky approach to devising signature schemes that is adapted to rank based cryptography. This new approach enables us to obtain a randomization of the sig...
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
cryptographic protocols cryptographic algorithms
2018/11/19
Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorith...
We present here Wave the first ``hash-and-sign'' code-based signature scheme which strictly follows the GPV strategy [GPV08]. It uses the family of ternary generalized (U,U+V)(U,U+V) codes. We prove t...
In this document, we introduce PKP-DSS: a Digital Signature Scheme based on the so-called Permuted Kernel Problem (PKP). PKP is an NP-complete algebraic problem that consists of finding a kernel vecto...
Masking the GLP Lattice-Based Signature Scheme at Any Order
Side-channel Masking lattice-based signature
2018/5/2
Abstract. Recently, numerous physical attacks have been demonstrated against lattice- based schemes, often exploiting their unique properties such as the reliance on Gaussian distributions, rejection ...
Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme
SCA FLUSH+RELOAD lattices
2016/3/18
We present the first side-channel attack on a lattice-based signature scheme, using the FLUSH+RELOAD cache-attack. The attack is targeted at the discrete Gaussian sampler, an important step in the Bim...
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
lattice-based cryptography tightness ideal lattices signatures
2016/1/27
In view of the expected progress in cryptanalysis it is important to find alternatives for currently
used signature schemes such as RSA and ECDSA. The most promising lattice-based signature
schemes ...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
Identity Based Deterministic Signature Aggregate Signature Full Aggregation
2012/6/14
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
public-key cryptography / Identity Based Deterministic Signature Aggregate Signature Full Aggregation Random Oracle Model, Provable Security
2012/3/20
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
Identity Based Deterministic Signature Aggregate Signature
2012/8/28
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...