Conjecture 发表于 2025-3-21 16:43:06
书目名称Information Security and Cryptology影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0465363<br><br> <br><br>书目名称Information Security and Cryptology影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0465363<br><br> <br><br>书目名称Information Security and Cryptology网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0465363<br><br> <br><br>书目名称Information Security and Cryptology网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0465363<br><br> <br><br>书目名称Information Security and Cryptology被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0465363<br><br> <br><br>书目名称Information Security and Cryptology被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0465363<br><br> <br><br>书目名称Information Security and Cryptology年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0465363<br><br> <br><br>书目名称Information Security and Cryptology年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0465363<br><br> <br><br>书目名称Information Security and Cryptology读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0465363<br><br> <br><br>书目名称Information Security and Cryptology读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0465363<br><br> <br><br>FLUSH 发表于 2025-3-21 23:30:37
http://reply.papertrans.cn/47/4654/465363/465363_2.png合并 发表于 2025-3-22 02:26:02
Strong Anonymous Signaturestrong anonymous signatures. For strong anonymous signatures, the identity of the signer remains secret even if the challenge message is chosen by an adversary. We then demonstrate some efficient constructions and prove their security in our model.潜移默化 发表于 2025-3-22 05:05:17
http://reply.papertrans.cn/47/4654/465363/465363_4.pngMIR 发表于 2025-3-22 08:48:05
Cryptanalysis of Two Ring Signcryption Schemeshang-Wang’s scheme (2008). We give different attack methods to the above two ring signcryption schemes. There exist Malicious KGC attack and Non-repudiation attack on Wang-Zhang-Ma’s scheme (2007).There exist anonymity attack and existential unforgeability attack on Zhu-Zhang-Wang’s scheme.希望 发表于 2025-3-22 15:36:00
Efficient Signcryption Key Encapsulation without Random Oraclesve their semantic security and existential unforgeability in the standard model. Compared to Tan’s schemes, our corresponding schemes have 20% faster speed in the key encapsulation, 33% faster speed in the key decapsulation, 33% shorter public key, 60% shorter private key, and |.| bits shorter ciphertext.归功于 发表于 2025-3-22 20:03:49
http://reply.papertrans.cn/47/4654/465363/465363_7.png财主 发表于 2025-3-23 00:33:22
http://reply.papertrans.cn/47/4654/465363/465363_8.png切割 发表于 2025-3-23 02:52:10
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPsccepting any input length that is fixed in the range of . to 2. bits, when the round functions are independently chosen fixed-length PRPs on . bits. We also prove that these are the minimum number of rounds required.chronicle 发表于 2025-3-23 09:26:59
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model-PKE scheme proposed by Long et al. , our scheme is more secure. Since our scheme deals with a malicious KGC and is proved secure in the standard model. Furthermore, our scheme does not need to compute pairings in the encryption phase. Therefore it is more efficient than Long et al.’s scheme .