Search

Your search keyword '"random oracle model"' showing total 1,304 results

Search Constraints

Start Over You searched for: Descriptor "random oracle model" Remove constraint Descriptor: "random oracle model"
1,304 results on '"random oracle model"'

Search Results

101. Efficient and Provably Secure Anonymous User Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks

102. Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

103. RKA Security for Identity-Based Signature Scheme

104. Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks

105. VPPCS: VANET-Based Privacy-Preserving Communication Scheme

106. LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network

107. Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT.

108. A secure and efficient key agreement framework for critical energy infrastructure using mobile device.

109. Fast, compact, and expressive attribute-based encryption.

110. Impossibility of Order-Revealing Encryption in Idealized Models

111. Short Digital Signatures and ID-KEMs via Truncation Collision Resistance

112. A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without Pairing in the Random Oracle Model

113. Fuzzy Identity-Based Signature from Lattices for Identities in a Large Universe

114. Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.

115. 面向 IoV 的无证书聚合签名方案.

116. A provably secure multi-server authentication scheme based on Chebyshev chaotic map.

117. Practical Lattice-Based Multisignature Schemes for Blockchains

118. Efficient Arbitrarily Divisible E-Cash Applicable to Secure Massive Transactions

119. Identity-Based Linkable Ring Signature Scheme

120. Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection

122. A Timestamp-Based Strong Designated Verifier Signature Scheme for Next-Generation Network Security Services

123. Universal Samplers with Fast Verification

124. Chosen-Ciphertext Secure Fully Homomorphic Encryption

125. Linearly Homomorphic Signatures with Designated Entities

126. An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA

127. Efficient and Short Identity-Based Deniable Authenticated Encryption

128. Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators

129. Secure Certificateless Proxy Re-encryption Without Pairing

130. One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key Generators

131. A Distributed Investment Encryption Scheme: Investcoin

132. Prover Efficient Public Verification of Dense or Sparse/Structured Matrix-Vector Multiplication

133. Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack

134. Computational Integrity with a Public Random String from Quasi-Linear PCPs

135. Non-interactive Secure 2PC in the Offline/Online and Batch Settings

136. Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited

137. ESS‐IBAA: Efficient, short, and secure ID‐based authentication algorithm for wireless sensor network.

138. Revisiting NIZK-Based Technique for Chosen-Ciphertext Security: Security Analysis and Corrected Proofs.

139. A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme

140. RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure

141. Novel efficient identity-based signature on lattices.

142. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks

143. 无对的去中心基于属性指定证实者签名.

144. A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices.

145. 一种可证安全无对运算的签密方案分析与改进.

146. Tightly CCA-secure encryption scheme in a multi-user setting with corruptions.

147. 基于格的两轮多重签名方案.

148. Efficient certificate‐based aggregate signature scheme for vehicular ad hoc networks.

149. Toward a formal proof for multi-secret sharing in the random oracle model.

150. Lattice signatures using NTRU on the hardness of worst‐case ideal lattice problems.

Catalog

Books, media, physical & digital resources