Search

Your search keyword '"random oracle model"' showing total 1,295 results

Search Constraints

Start Over You searched for: Descriptor "random oracle model" Remove constraint Descriptor: "random oracle model" Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
1,295 results on '"random oracle model"'

Search Results

1. Lattice-based ring signcryption scheme for smart healthcare management.

2. Committed-programming reductions: formalizations, implications and relations.

3. Robust Schnorr-based subgroup multi-signature scheme

4. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency.

5. 带鲁棒性的子分组多重 Schnorr 签名方案.

6. An efficient group signature based certificate less verification scheme for vehicular ad-hoc network.

8. The Analysis of Schnorr Multi-Signatures and the Application to AI

10. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids.

11. SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking

12. A Secure Authentication Protocol Supporting Efficient Handover for UAV.

13. Simulation extractable versions of Groth's zk-SNARK revisited.

14. Limits in the Provable Security of ECDSA Signatures

15. Making the Identity-Based Diffie–Hellman Key Exchange Efficiently Revocable

16. Computational Models to Prove Security Protocols Against Adversary

17. On the Quantum Security of HAWK

18. Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption

19. Rai-Choo! Evolving Blind Signatures to the Next Level

20. Non-interactive Blind Signatures for Random Messages

21. Proof-Carrying Data from Arithmetized Random Oracles

22. A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity.

23. 安全高效的无对运算无证书有序多重签名方案.

24. Blockchain-enhanced certificateless signature scheme in the standard model

25. A quantum resistant universal designated verifier signature proof

26. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids

27. Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud.

28. A novel and quantum-resistant handover authentication protocol in IoT environment.

29. A quantum resistant universal designated verifier signature proof.

30. A Secure and Privacy-Preserving Lightweight Authentication and Key Exchange Algorithm for Smart Agriculture Monitoring System

33. One-Time Anonymous Certificateless Signcryption Scheme Based on Blockchain

34. PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More

35. On Succinct Non-interactive Arguments in Relativized Worlds

37. Robust Subgroup ID-based Multi-signature Scheme

38. Pairing-free certificateless blind signature scheme for smart grid

39. RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things.

40. An Authenticated Group Shared Key Mechanism Based on a Combiner for Hash Functions over the Industrial Internet of Things.

41. Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.

42. A Secure Authentication Protocol Supporting Efficient Handover for UAV

43. Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home

44. Practical dynamic group signatures without knowledge extractors.

45. 基于身份的可审计多重截取签名方案.

46. Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices.

47. Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application.

48. Quantum-attack-resilience OTP-based multi-factor mutual authentication and session key agreement scheme for mobile users.

49. Linearly Homomorphic Signatures with Designated Combiner

Catalog

Books, media, physical & digital resources