Search

Your search keyword '"random oracle model"' showing total 1,304 results

Search Constraints

Start Over You searched for: Descriptor "random oracle model" Remove constraint Descriptor: "random oracle model"
1,304 results on '"random oracle model"'

Search Results

1. zkSNARKs in the ROM with Unconditional UC-Security

2. How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption

3. Lattice-based ring signcryption scheme for smart healthcare management.

4. Committed-programming reductions: formalizations, implications and relations.

5. Fiat–Shamir Bulletproofs are Non-malleable (in the Random Oracle Model)

6. Robust Schnorr-based subgroup multi-signature scheme

7. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency.

8. 带鲁棒性的子分组多重 Schnorr 签名方案.

9. An efficient group signature based certificate less verification scheme for vehicular ad-hoc network.

11. The Analysis of Schnorr Multi-Signatures and the Application to AI

13. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids.

14. SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking

15. A Secure Authentication Protocol Supporting Efficient Handover for UAV.

16. Simulation extractable versions of Groth's zk-SNARK revisited.

17. Limits in the Provable Security of ECDSA Signatures

18. Making the Identity-Based Diffie–Hellman Key Exchange Efficiently Revocable

19. Computational Models to Prove Security Protocols Against Adversary

20. On the Quantum Security of HAWK

21. Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption

22. Rai-Choo! Evolving Blind Signatures to the Next Level

23. Non-interactive Blind Signatures for Random Messages

24. Proof-Carrying Data from Arithmetized Random Oracles

25. A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity.

26. 安全高效的无对运算无证书有序多重签名方案.

27. Blockchain-enhanced certificateless signature scheme in the standard model

28. A quantum resistant universal designated verifier signature proof

29. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids

30. Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud.

31. A novel and quantum-resistant handover authentication protocol in IoT environment.

32. A quantum resistant universal designated verifier signature proof.

33. A Secure and Privacy-Preserving Lightweight Authentication and Key Exchange Algorithm for Smart Agriculture Monitoring System

36. One-Time Anonymous Certificateless Signcryption Scheme Based on Blockchain

37. PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More

38. On Succinct Non-interactive Arguments in Relativized Worlds

40. Robust Subgroup ID-based Multi-signature Scheme

41. Pairing-free certificateless blind signature scheme for smart grid

42. RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things.

43. An Authenticated Group Shared Key Mechanism Based on a Combiner for Hash Functions over the Industrial Internet of Things.

44. Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.

45. A Secure Authentication Protocol Supporting Efficient Handover for UAV

46. Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home

47. Practical dynamic group signatures without knowledge extractors.

48. 基于身份的可审计多重截取签名方案.

49. Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices.

50. Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application.

Catalog

Books, media, physical & digital resources