T Li, J Zhang, MS Obaidat, C Lin, Y Lin… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Wireless networks ensure the unmanned aerial vehicles (UAVs) communicate and cooperate with each other, which plays an indispensable role among UAVs. The two crucial …
N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF “ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …
Key-homomorphic properties of cryptographic objects, ie, homomorphisms on their key space, have proven to be useful, both from a theoretical as well as a practical perspective …
Digital signatures are a vital part of the digital world. The trust factor in the digital world is ensured with a digital signature. Over the evolution, the purpose remained constant, but the …
C Guo, X Wang, X Xie, Y Yu - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
Multi-user (mu) security considers large-scale attackers that, given access to a number of cryptosystem instances, attempt to compromise at least one of them. We initiate the study of …
Z Wang, H Li, H Wang, Z Xiao, P Lu… - … Conference on Big …, 2021 - ieeexplore.ieee.org
Each blockchain's node needs to store a backup of all blocks, resulting in the whole network needs O (n) storage space, which greatly affects the nodes' scalability. Parallel proof of vote …
Identification schemes are used by machines to securely authenticate the identity of other machines or their users over computer networks. As conventional public key schemes …
Multi-user (mu) security considers large-scale attackers that, given access to a number of cryptosystem instances, attempt to compromise at least one of them. We initiate the study of …
M Rambaud, C Levrat - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In a fully non-interactive multi-signature, resp. aggregate-signature scheme (fNIM, resp. fNIA), signatures issued by many signers on the same message, resp. on different …