Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Past year
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
May 1, 2024 · However, due to its limited adoption in the literature, we opt for a property-based definition of accumulators rather than a universally composable treatment.
Feb 22, 2024 · In this setting, the sender uses the recipient's public encryption key to encrypt a message before signing it. Only the recipient can verify that the signature ...
Apr 18, 2024 · ... Universally Composable security against adaptive corruptions. • One-round CTE is implied by DDH or the hidden subgroup assumption in class groups, with a ...
Feb 10, 2024 · We propose a secure deepfake mitigation framework using Elliptic Curve Cryptography (ECC)-based signature and encryption schemes.
Feb 15, 2024 · The scheme's security was demonstrated using the universally composable model. Storage and signature size decreased, and signing and verification became faster.
May 16, 2024 · Our research focuses on a comprehensive lightweight security framework for data protection, authentication, and malicious node detection.
Apr 1, 2024 · Universally Composable RFID Identification and Authentication Protocols, ACM ... Identity-Based signcryption from identity-based cryptography. WISA'11 ...
Jan 22, 2024 · Canetti and H. Krawczyk, “Universally composable notions of key exchange and secure channels,” in Proc. Int. Conf. Theory Appl. Cryptogr.
Aug 21, 2024 · Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki: Bare PAKE: Universally Composable Key Exchange from just Passwords.
Oct 20, 2023 · Canetti and H. Krawczyk, ''Universally composable notions of key exchange and secure channels,'' in Proc. Int. Conf. Theory Appl. Cryp-.