细节 发表于 2025-3-25 03:31:09

sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devicespower-limited trusted device only performs one exponentiation, which can be pre-computed offline; 3) all the online exponentiation computations can be performed in the powerful host. The above advantages make sHMQV enjoy better performance than HMQV and (s,r)OAKE, especially when deployed in the sce

fructose 发表于 2025-3-25 08:40:42

Batch Blind Signatures on Elliptic Curvesso that multiple messages can be signed in a batch for sake of saving computation costs. The algorithm is further employed in the verification process, which gives a different batch signature verification approach from the existing batch verification algorithm. An attracting feature of our approach

停止偿付 发表于 2025-3-25 15:19:22

http://reply.papertrans.cn/47/4654/465319/465319_23.png

尖叫 发表于 2025-3-25 16:01:26

http://reply.papertrans.cn/47/4654/465319/465319_24.png

Motilin 发表于 2025-3-25 22:02:53

https://doi.org/10.1007/978-3-319-17533-1Authentication; Authorization; Cloud computing; Database and storage security; Digital signature; Distrib

collagen 发表于 2025-3-26 01:33:13

Cramer-Shoup Like Chosen Ciphertext Security from LPNWe propose two chosen ciphertext secure public key encryption schemes from the learning parity with noise problem. Currently, all existing chosen ciphertext secure public key encryption schemes from the hard learning problems are constructed based on the All-But-One technique, while our schemes are based on the Cramer-Shoup technique.

HERTZ 发表于 2025-3-26 08:10:30

http://reply.papertrans.cn/47/4654/465319/465319_27.png

Encumber 发表于 2025-3-26 11:22:25

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465319.jpg

迫击炮 发表于 2025-3-26 15:58:51

http://reply.papertrans.cn/47/4654/465319/465319_29.png

Detonate 发表于 2025-3-26 17:13:56

Strongly Secure Key Exchange Protocol with Minimal KEMuction is provably secure without random oracles in the CK . model which is stronger than CK model and eCK model. Compared with similar KEM-based AKE protocols, our generic construction achieves CK . security with the minimal KEM (namely, one CCA-secure KEM and one CPA-secure KEM).
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Security Practice and Experience; 11th International C Javier Lopez,Yongdong Wu Conference proceedings 2015 Springer Internatio