搜索结果: 1-15 共查到“军队指挥学 digital signatures”相关记录16条 . 查询时间(0.109 秒)
We present a pairing-based signature scheme for use in blockchains that achieves substantial savings in bandwidth and storage requirements while providing strong security guarantees. Our signature sch...
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
Tight security digital signatures Fiat-Shamir
2018/6/5
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose cryptographic parameters in a way that is supported by a security proof, without the need to sacrif...
A digital signature scheme (DSS), which consists of a key-generation, a signing, and a verification algorithm, is an invaluable tool in cryptography. The first and still most widely used security defi...
CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
digital signatures post-quantum cryptography implementations
2017/6/28
This paper presents Dilithium, a lattice-based signature scheme that is part of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) package that will be submitted to the NIST call for post-quant...
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs
Signatures Kummer Curve25519
2017/6/6
qDSA is a high-speed, high-security signature scheme that facilitates implementations with a very small memory footprint, a crucial requirement for embedded systems and IoT devices, and that uses the ...
The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following the framework detailed by Lyubashevsky t...
The fisherman caught a quantum fish. "Fisherman, please let me go", begged the fish, "and I will grant you three wishes". The fisherman agreed. The fish gave the fisherman a quantum computer, three qu...
Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings
lattice ideal lattice Ring-SIS
2016/12/10
In this work, we show that the above may actually be possible. We construct a digital signature scheme based (in the random oracle model) on a simple adaptation of the Ring-SIS problem which is as har...
Digital Signatures from Symmetric-Key Primitives
post-quantum cryptography signatures block cipher
2016/12/7
We propose practically efficient signature schemes which feature several attractive properties: (a) they only rely on the security of symmetric-key primitives (block ciphers, hash functions), and are ...
Blank Digital Signatures
Digital signature scheme blank digital signatures elliptic curves pairings polynomial commitments
2013/4/18
In this paper we present a novel type of digital signatures, which we call blank digital signatures. The basic idea behind this scheme is that an originator can define and sign a message template, des...
On the Theory and Practice of Personal Digital Signatures
Personal Digital Signatures issuing digital signatures key-logging
2009/6/12
We take a step towards a more realistic modeling of personal
digital signatures, where a human user, his mobile equipment, his PC and
a server are all considered as independent players in the protoc...
Provable Security of Digital Signatures in the Tamper-Proof Device Model
Provable Security Digital Signatures Tamper-Proof Device Model
2009/6/5
Provable Security of Digital Signatures in the Tamper-Proof Device Model.
Practical Attacks on Digital Signatures Using MD5 Message Digest
collision hash function MD5
2009/4/3
We use the knowledge of the single MD5 collision published by
Wang et al. [2] to show an example of a pair of binary self-extract packages
with equal MD5 checksums, whereas resulting extracted contr...
Tamper-Evident Digital Signatures;Protecting Certi¯cation Authorities Against Malware
covert channel subliminal channel tamper-evident undercover
2009/2/8
We introduce the notion of tamper-evidence for digital signature generation in order to
defend against attacks aimed at covertly leaking secret information held by corrupted network nodes.
This is a...
Cryptanalysis on an Algorithm for Efficient Digital Signatures
Cryptanalysis Algorithm Efficient Digital Signatures
2008/12/26
The total computation of the generation and verification of
personnel identification or digital signature is heavy. For many schemes of
them, the total computation is not less than hundreds of modul...