Search

Your search keyword '"random oracle model"' showing total 1,322 results

Search Constraints

Start Over You searched for: Descriptor "random oracle model" Remove constraint Descriptor: "random oracle model"
1,322 results on '"random oracle model"'

Search Results

551. ID-Based (t,n) Threshold Proxy Signcryption for Multi-agent Systems

552. An Elliptic Curve Backdoor Algorithm for RSASSA

553. Hiding Information Hiding

554. Designated Verifier Signature: Definition, Framework and New Constructions

555. Efficient Identity-Based Signcryption Scheme for Multiple Receivers

556. Identity-Based Proxy Signature from Pairings

557. General and Efficient Certificateless Public Key Encryption Constructions

558. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System

559. Hash-and-Sign with Weak Hashing Made Secure

560. Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM

561. Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards

562. Generic Certificateless Key Encapsulation Mechanism

563. Unrestricted Aggregate Signatures

564. A 'proof-reading' of Some Issues in Cryptography

565. Efficient Certificateless Signature Schemes

566. Gradually Convertible Undeniable Signatures : (Michels-Petersen-Horster Convertible Undeniable Signatures Revisited)

567. Simulatable Adaptive Oblivious Transfer

568. General Ad Hoc Encryption from Exponent Inversion IBE

569. Non-interactive Proofs for Integer Multiplication

570. Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants

571. Batch Verification of Short Signatures

572. An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess’s Scheme

573. A Novel Verifiably Encrypted Signature Scheme Without Random Oracle

574. A Sanitizable Signature Scheme with Aggregation

575. Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles

576. Traceable Ring Signature

577. Optimistic Fair Exchange in a Multi-user Setting

578. A Closer Look at PKI: Security and Efficiency

579. Controllable Ring Signatures

580. Designated Confirmer Signatures Revisited

581. Efficient KEMs with Partial Message Recovery

582. On the Key-Privacy Issue of McEliece Public-Key Encryption

583. New Efficient Certificateless Signature Scheme

584. (Convertible) Undeniable Signatures Without Random Oracles

585. Transitive Signatures from Braid Groups

586. Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues

587. Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption

588. Authenticated Key Exchange and Key Encapsulation in the Standard Model

589. Miniature CCA2 PK Encryption: Tight Security Without Redundancy

590. Blind Identity-Based Encryption and Simulatable Oblivious Transfer

591. On Privacy Models for RFID

592. Decryptable Searchable Encryption

593. A Provably Secure Ring Signature Scheme in Certificateless Cryptography

594. A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol

595. Generic Certificateless Encryption in the Standard Model

596. Pairing-Based Onion Routing

597. Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability

598. Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems : (Extended Abstract)

599. Efficient Password-Based Authenticated Key Exchange Without Public Information

600. Generalized Key Delegation for Hierarchical Identity-Based Encryption

Catalog

Books, media, physical & digital resources