搜索结果: 1-7 共查到“军队指挥学 Digital Signature Schemes”相关记录7条 . 查询时间(0.187 秒)
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
digital signatures hash functions public-key cryptography
2019/6/10
A new hash-based, server-supported digital signature scheme was proposed recently. We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the ...
Subliminal channels in post-quantum digital signature schemes
Subliminal channels post-quantum digital signatures
2019/5/29
We analyze the digital signatures schemes submitted to NIST's Post-Quantum Cryptography Standardization Project in search for subliminal channels.
Identity-based encryption and digital signature schemes using extended chaotic maps
Chaotic maps Identity-based encryption Digital signature
2016/1/23
This paper designed a new extended chaotic map-based Identity-based encryption (ECM-IBE) scheme and Identitybased digital signature (ECM-IDS) scheme using extended chaotic maps. The security of the E...
Design of identity-based digital signature schemes using extended chaotic maps
Chaotic maps Identity-based encryption Digital signature
2016/1/23
Inspired from the Identity-based cryptosystem proposed by Adi Shamir, and Boneh and Franklin, this paper designed a new Identity-based digital signature (ECM-IDS) scheme using extended chaotic maps. ...
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
digital signatures pairing-based cryptography batch verification automation crypographic compiler
2013/4/18
As devices everywhere increasingly communicate with each other, many security applications will require low-bandwidth signatures that can be processed quickly. Pairing-based signatures can be very sho...
Improving The Exact Security Of Digital Signature Schemes
digital signatures ID schemes random oracles
2009/4/17
We put forward a new method of constructing Fiat-Shamir-like signature schemes that yields better
:exact security" than the original Fiat-Shamir method. (We also point out, however, that such tight
...
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions
Public-key cryptography signature schemes discrete logarithm problem
2008/9/19
This paper presents two fast digital signature schemes based on Difffie-Hellman
assumptions. In the random oracle model, the first scheme S1 has a tight security reduction
to the computational Dif...