Search

Your search keyword '"random oracle model"' showing total 65 results

Search Constraints

Start Over You searched for: Descriptor "random oracle model" Remove constraint Descriptor: "random oracle model" Database OpenAIRE Remove constraint Database: OpenAIRE
65 results on '"random oracle model"'

Search Results

1. Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice

2. RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things

3. An Authenticated Group Shared Key Mechanism Based on a Combiner for Hash Functions over the Industrial Internet of Things

4. Quantum Security of Subset Cover Problems

5. Unforgeable Digital Signature Integrated into Lightweight Encryption Based on Effective ECDH for Cybersecurity Mechanism in Internet of Things

6. An Anonymous Certificateless Signcryption Scheme for Internet of Health Things

7. Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

8. Secure Threshold Ring Signature Based on SM9

9. A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme

10. A Study of Non-Deterministic Signature Scheme Secure Against Nonce Leakage

11. RKA Security for Identity-Based Signature Scheme

12. LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network

13. VPPCS: VANET-Based Privacy-Preserving Communication Scheme

14. Efficient and Provably Secure Anonymous User Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks

15. Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

16. Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks

17. RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure

18. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks

19. A Hash-Based Quantum-Resistant Chameleon Signature Scheme

20. Practical Lattice-Based Multisignature Schemes for Blockchains

21. Efficient Arbitrarily Divisible E-Cash Applicable to Secure Massive Transactions

22. Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection

23. Identity-Based Linkable Ring Signature Scheme

24. Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange

25. Practical Dynamic Group Signatures Without Knowledge Extractors

26. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network

27. Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems

28. Can Verifiable Delay Functions Be Based on Random Oracles?

29. An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles

30. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things

31. New technique for chosen-ciphertext security based on non-interactive zero-knowledge

32. Identity-Based Encryption with Filtered Equality Test for Smart City Applications

33. Non-interactive zero knowledge proofs in the random oracle model

34. Multi-user Security Bound for Filter Permutators in the Random Oracle Model

35. Revisiting NIZK-Based Technique for Chosen-Ciphertext Security: Security Analysis and Corrected Proofs

36. Provably Secure Covert Communication on Blockchain

37. Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model

38. An efficient certificateless blind signature scheme without bilinear pairing

39. An Efficient Multi-PKG Online/Offline Identity-Based Encryption Scheme for Wireless Sensor Network

40. Identity based ring signcryption schemes revisited

41. Cryptanalysis of an efficient password-based group key agreement protocol

43. An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks

44. Simulation-based secure functional encryption in the random oracle model

45. Implicit and Explicit Certificates-Based Encryption Scheme

46. Varnostna analiza protokolov za overjen dogovor o ključu in shem za digitalni podpis

47. IND-CCA secure encryption based on a Zheng-Seberry scheme

48. Proofs of Space: When Space Is of the Essence

49. Code-Based Public-Key Encryption Resistant to Key Leakage

50. Provable Security and Indifferentiability

Catalog

Books, media, physical & digital resources