搜索结果: 1-5 共查到“军队指挥学 Tight security reduction”相关记录5条 . 查询时间(0.031 秒)
A tight security reduction in the quantum random oracle model for code-based signature schemes
Quantum Random Oracle Quantum-Safe Cryptography Code-Based Cryptography
2017/9/28
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST call to standardize quantum safe cryptography. However, only few signature schemes can have concret...
Efficient Key Exchange with Tight Security Reduction
Efficient Key Exchange Tight Security Reduction
2009/6/23
In this paper, we propose two authenticated key exchange (AKE) protocols, SMEN and
SMEN−, which have efficient online computation and tight security proof in the extended
Canetti-Krawczyk (eCK...
An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction
authenticated key exchange Gap Diffie-Hellman assumption extended CanettiKrawzcyk model
2009/6/5
In this paper, we present a new authenticated key exchange(AKE) protocol, called
NETS, and prove its security in the extended Canetti-Krawczyk model under the random oracle
assumption and the gap Di...
Efficient Identity-Based Encryption with Tight Security Reduction
ID-based encryption tight security reduction
2009/3/4
In a famous paper of Crypto'01, Boneh and Franklin pro-
posed the first identity-based encryption scheme (IBE), around fifteen
years after the concept was introduced by Shamir. Their scheme security...
An Efficient CDH-based Signature Scheme With a Tight Security Reduction
Public-key cryptography signature schemes discrete logarithm problem
2009/1/15
At Eurocrypt ’03, Goh and Jarecki showed that, contrary
to other signature schemes in the discrete-log setting, the EDL signature
scheme has a tight security reduction, namely to the Computational
...