Zobrazeno 1 - 10
of 196
pro vyhledávání: '"Adaptive chosen-ciphertext attack"'
Autor:
Isobe Shuji, Koizumi Eisuke
Publikováno v:
Journal of Mathematical Cryptology, Vol 17, Iss 1, Pp p. 13-27 (2023)
In CANDARW ’18, Isobe et al. proposed a secure encryption protocol on non-abelian groups based on the Anshel–Anshel–Goldfeld key exchange protocol. There have remained two weak points on the protocol: one is that the protocol is indistinguishab
Externí odkaz:
https://doaj.org/article/9a4c7081c1a148e19bc4afe75b95562b
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :143-159
Publikováno v:
IEEE Transactions on Vehicular Technology. 70:5974-5989
Vehicular ad-hoc networks (VANETs) enable vehicles to exchange safety information with the surrounding vehicles and infrastructure in order to ensure safety and efficiency in traffic management. Recently however, vehicles come from different manufact
Publikováno v:
Wireless Personal Communications. 119:3589-3608
This article proposes a hybrid certificateless signcryption scheme that is secure against adaptive chosen ciphertext adversary in the random oracle model. The scheme combines an asymmetric encryption which is one way against chosen plaintext attack a
Publikováno v:
Wireless Personal Communications. 118:3349-3366
With the current developments in wireless networks, the use of Wireless sensor networks (WSNs) in the medical field has attracted a lot of attention. WSNs are being used to collect and transmit patient physiological information in ubiquitous healthca
Publikováno v:
Wireless Networks. 27:1063-1076
With the rapid popularity and wide adoption of cloud storage, providing privacy-preserving by protecting sensitive information becomes a matter of grave concern. The most effective and sensible way to address this issue is to encrypt the data before
Publikováno v:
IEEE Transactions on Vehicular Technology. 69:11266-11280
Vehicular ad hoc networks (VANETs) ensure improvement in road safety and traffic management by allowing the vehicles and infrastructure that are connected to them to exchange safety messages. Due to the open wireless communication channels, security
Publikováno v:
The Computer Journal. 64:509-533
Attribute-based encryption with equality test (ABEET) simultaneously supports fine-grained access control on the encrypted data and plaintext message equality comparison without decrypting the ciphertexts. Recently, there have been several literature
Publikováno v:
Information Sciences. 516:331-345
Authentication service in communication is essential. However, information flows transmitted during an authentication process might reveal some personal information. In this paper, we propose a deniable authentication protocol with source hiding whic
Publikováno v:
Soft Computing. 24:6531-6537
Public key cryptosystems more recently developed have to be strong against newer and more advanced forms of attacks. The security protection of a public key cryptosystem relies heavily on the design of the public key. The key authentication procedure