Search

Your search keyword '"random oracle model"' showing total 466 results

Search Constraints

Start Over You searched for: Descriptor "random oracle model" Remove constraint Descriptor: "random oracle model" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
466 results on '"random oracle model"'

Search Results

1. Lattice-based ring signcryption scheme for smart healthcare management.

2. Committed-programming reductions: formalizations, implications and relations.

3. Fiat–Shamir Bulletproofs are Non-malleable (in the Random Oracle Model)

4. Robust Schnorr-based subgroup multi-signature scheme

5. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency.

6. 带鲁棒性的子分组多重 Schnorr 签名方案.

7. An efficient group signature based certificate less verification scheme for vehicular ad-hoc network.

8. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids.

9. SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking

10. A Secure Authentication Protocol Supporting Efficient Handover for UAV.

11. Simulation extractable versions of Groth's zk-SNARK revisited.

12. A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity.

13. 安全高效的无对运算无证书有序多重签名方案.

14. Blockchain-enhanced certificateless signature scheme in the standard model

15. A quantum resistant universal designated verifier signature proof

16. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids

17. Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud.

18. A novel and quantum-resistant handover authentication protocol in IoT environment.

19. A quantum resistant universal designated verifier signature proof.

20. A Secure and Privacy-Preserving Lightweight Authentication and Key Exchange Algorithm for Smart Agriculture Monitoring System

21. Robust Subgroup ID-based Multi-signature Scheme

22. Pairing-free certificateless blind signature scheme for smart grid

23. RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things.

24. An Authenticated Group Shared Key Mechanism Based on a Combiner for Hash Functions over the Industrial Internet of Things.

25. Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.

26. A Secure Authentication Protocol Supporting Efficient Handover for UAV

27. Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home

28. Practical dynamic group signatures without knowledge extractors.

29. 基于身份的可审计多重截取签名方案.

30. Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices.

31. Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application.

32. Quantum-attack-resilience OTP-based multi-factor mutual authentication and session key agreement scheme for mobile users.

33. A Secure User Authentication Protocol for Heterogeneous Mobile Environments

34. Unforgeable Digital Signature Integrated into Lightweight Encryption Based on Effective ECDH for Cybersecurity Mechanism in Internet of Things.

35. Active Authentication Protocol for IoV Environment with Distributed Servers.

36. Pairing-free certificateless blind signature scheme for smart grid.

37. 一种面向低轨卫星网络的高效无证书身份认证方案.

38. mIBS方案的分析与改进.

39. 格上基于身份的可链接环签名方案.

40. 安全增强的智能电网轻量级匿名认证方案.

41. Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme

42. RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure.

43. RAKS: robust authentication and key agreement scheme for satellite infrastructure.

44. A power resource dispatching framework with a privacy protection function in the Power Internet of Things.

45. Preprocessing succinct non-interactive arguments for rank-1 constraint satisfiability from holographic proofs.

46. A blockchain‐based approach to secure electronic health records using fuzzy commitment scheme.

47. Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home.

48. Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS.

49. ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks.

50. Lattice-based strong designated verifier signature with non-delegatability.

Catalog

Books, media, physical & digital resources