Results 1 - 10
of
35
One-round id-based threshold signature scheme from bilinear pairings
- Informatica
, 2009
"... Abstract. In this paper, we propose a new ID-based threshold signature scheme from the bilinear pairings, which is provably secure in the random oracle model under the bilinear Diffie–Hellman assumption. Our scheme adopts the approach that the private key associated with an identity rather than the ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
Abstract. In this paper, we propose a new ID-based threshold signature scheme from the bilinear pairings, which is provably secure in the random oracle model under the bilinear Diffie–Hellman assumption. Our scheme adopts the approach that the private key associated with an identity rather than
APractical Lattice-based Digital Signature Schemes
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract
- Add to MetaCart
Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case
Threshold Password-based Authenticated Key Exchange using Matrix
"... Authentication protocols rely on the possession of keys by the parties to be authenticated. For security, keys must be chosen randomly and have to have a long length from 100 bits to thousands of bits. But such keys are difficult to memorize for humans. Password-based authenticated key exchange prot ..."
Abstract
- Add to MetaCart
protocols offer an efficient method to achieve an authenticati-on and a secure communication between two parties who share a secret key. For past decade, many protocols were proposed. Some of the properties of the most dominant protocols are based on the Diffie-Hellman messages or RSA assumption. Hence
Efficient Hash-Based Signatures on Embedded Devices
"... Authentication and message integrity are essential building blocks for protocols of many security related verification processes like data origin authentication for valid software updates or device authentication. Critical embedded devices- like a brake control unit in a car-must only accept updates ..."
Abstract
- Add to MetaCart
updates from valid issuers. At the same time it is essential- for security and commercial reasons- to prove the authenticity of the device to other integrated systems to prevent product counterfeiting. The most widely used algorithms for digital signatures, RSA and ECDSA, depend on finite field engines
An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes
"... Abstract. The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently propos ..."
Abstract
- Add to MetaCart
proposed by Cayrel et al. in [14]. Our proposed scheme benefits of a performance gain as a result of the reduction in the soundness error from 2/3 for Stern’s scheme to 1/2 per round for the q-SD scheme. Our threshold ring signature scheme uses random linear codes over the field Fq, secure in the random
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer
, 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract
- Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
"... Abstract. Public-key encryption schemes with non-interactive opening (PKENO) allow a receiver to non-interactively convince third parties that a ciphertext decrypts to a given plaintext or, alternatively, that such a ciphertext is invalid. Two practical generic constructions for PKENO have been prop ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
valid. Next, we prove that PKENO can be built out of robust non-interactive threshold publickey cryptosystems, a primitive seemingly weaker than identity-based encryption. Using the new transformation, we construct two efficient PKENO schemes: one based on the Decisional Diffie-Hellman assumption (in
Private Fingerprint Matching
"... Abstract. We propose a fully private fingerprint matching protocol that compares two fingerprints based on the most widely-used minutia-based fingerprint matching algorithm. The protocol enables two parties, each holding a private fingerprint, to find out if their fingerprints belong to the same ind ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
individual. Unlike previous works, we do not make any simplifying assumption on the matching algorithm or use generic multiparty computation protocols in our constructions. We employ a commonly-used algorithm that works by first comparing minutia pairs from the two fingerprints based on their types
Dissertação submetida como requisito parcial para obtenção do grau de Mestre em Finanças
"... An approach based on Extreme Value Theory as a measure to quantify market risk of equity securities and portfolios ..."
Abstract
- Add to MetaCart
An approach based on Extreme Value Theory as a measure to quantify market risk of equity securities and portfolios
Results 1 - 10
of
35