搜索结果: 1-7 共查到“军队指挥学 identification schemes”相关记录7条 . 查询时间(0.125 秒)
A Modular Treatment of Blind Signatures from Identification Schemes
Blind signature identification schemes Forking Lemma
2019/3/6
We propose a modular security treatment of blind signatures derived from linear identification schemes in the random oracle model. To this end, we present a general framework that captures several wel...
Optimal Security Proofs for Signatures from Identification Schemes
Signatures Identification Schnorr tightness
2016/2/24
We perform a concrete security treatment of digital signature schemes obtained from canonical
identification schemes via the Fiat-Shamir transform. If the identification scheme is rerandomizable
and...
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Leakage Resilience Bounded Retrieval Model Proof of Storage
2015/12/22
We provide a framework for constructing leakage-resilient identification (ID) protocols in
the bounded retrieval model (BRM) from proofs of storage (PoS) that hide partial information
about the file...
Tightly-Secure Signatures From Lossy Identification Schemes
Signature schemes tight reductions Fiat-Shamir
2014/3/5
In this paper we present three digital signature schemes with tight security reductions. Our first signature scheme is a particularly efficient version of the short exponent discrete log based scheme ...
How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG
RFID Identification Schemes Robust PRBG
2009/6/4
In this paper, we analyze an RFID identification scheme which is designed to provide forward
untraceability and backward untraceability. We show that if a standard cryptographic
pseudorandom bit gen...
Pairing-based identification schemes
Pairing-based identification schemes bilinear pairings
2009/3/6
We propose four different identification schemes that make use of bilinear pairings, and prove their security under certain computational assumptions. Each of the schemes is more efficient and/or more...
Cryptanalysis of two identification schemes based on an ID-based cryptosystem
Cryptanalysis identification schemes ID-based cryptosystem
2009/1/16
Two identification schemes based on the Maurer-Yacobi ID-based cryptosys-
tem are analysed and shown to su®er from serious security problems.