Zobrazeno 1 - 10
of 243
pro vyhledávání: '"Fangguo ZHANG"'
Autor:
Chao Chen, Fangguo Zhang
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-12 (2023)
Abstract Verifiable delay functions (VDFs) and delay encryptions (DEs) are two important primitives in decentralized systems, while existing constructions are mainly based on time-lock puzzles. A disparate framework has been established by applying i
Externí odkaz:
https://doaj.org/article/5bc7bc2242db4dfdba572f54a80a4579
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13-310 and BW19-286, sparked interest in the field of public-key cryptography as small sizes of the prime fields. However, compared to mainstream pairin
Externí odkaz:
https://doaj.org/article/a7593ff9a8904eeca43ec5b1efa5f9fb
Publikováno v:
Information, Vol 15, Iss 1, p 54 (2024)
A bilinear map whose domain and target sets are identical is called a self-bilinear map. Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals information about the underlying cyclic group, the Decisional Diffie–H
Externí odkaz:
https://doaj.org/article/966acf125da940ebb3263fc22b9e0844
Publikováno v:
IEEE Access, Vol 7, Pp 129834-129847 (2019)
Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic. In this paper, we pr
Externí odkaz:
https://doaj.org/article/4e52e7eb98eb4e09891943f8bdafc416
Autor:
Ping Wang, Fangguo Zhang
Publikováno v:
Journal of Applied Mathematics, Vol 2012 (2012)
Pollard's rho method and its parallelized variant are at present known as the best generic algorithms for computing discrete logarithms. However, when we compute discrete logarithms in cyclic groups of large orders using Pollard's rho method, collisi
Externí odkaz:
https://doaj.org/article/a7aadcb712544caebaae294e6411ebdc
Publikováno v:
網際網路技術學刊. 24:539-548
Anonymity is a necessary property for a ring signature scheme and also its variant such as linkable ring signature and traceable ring signature schemes, which are especially useful in blockchains. Intuitively, those variants were designed for detecti
Publikováno v:
Theoretical Computer Science. 940:14-35
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1551-1558
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :858-870
Publikováno v:
International Journal of Intelligent Systems. 37:6857-6876