Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Mohammad Dakhilalian"'
Publikováno v:
IET Communications, Vol 17, Iss 10, Pp 1199-1207 (2023)
Abstract Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosyste
Externí odkaz:
https://doaj.org/article/826484b3531a4990831f8d8c89326be8
Publikováno v:
Computer Networks. 224:109598
Publikováno v:
Information Sciences. 510:155-164
Chameleon hash functions are collision resistant when only the hashing keys of the functions are known. In particular, without the knowledge of the secret information, the chameleon hash function is merely like a regular cryptographic hash function,
Publikováno v:
Theoretical Computer Science. 795:225-239
We give a new approach to build tightly secure signatures for signing a vector of group elements in a bilinear group. We illustrate its usefulness to construct efficient signature schemes by giving two new constructions of partially structure preserv
Publikováno v:
IET Information Security. 13:459-468
In a designated verifier signature (DVS) scheme, the validity of the signature can only be checked by a designated entity chosen by the signer. Furthermore, the designated entity cannot convince a third party that the signature is generated by the si
Publikováno v:
The Computer Journal. 62:1178-1193
Certificateless public key cryptography (CL-PKC) promises a practical resolution in establishing practical schemes, since it addresses two fundamental issues, namely the necessity of requiring certificate managements in traditional public key infrast
Publikováno v:
Information Sciences. 479:321-334
The notion of a Designated Verifier Signature (DVS) scheme allows a signer to create a signature which is only verifiable by an intended verifier. DVS is a very useful scheme for authenticating a signer without interfering with her privacy. In 2003,
Publikováno v:
International Journal of Information Security. 18:619-635
In a designated verifier signature (DVS) scheme, the signer (Alice) creates a signature which is only verifiable by a designated verifier (Bob). Furthermore, Bob cannot convince any third party that the signature was produced by Alice. A DVS scheme i
Autor:
Parvin Rastegari, Mohammad Dakhilalian
Publikováno v:
ISCISC
In 2016, Zheng and Li proposed a certificateless signcryption (CL-SC) scheme and claimed that their scheme is confidential (IND-CCA) and unforgeable (EUF-CMA) against both key replacement and malicious KGC attacks, in the standard model. In this pape
Publikováno v:
Security and Communication Networks. 9:27-33
PRESENT and MIBS are two lightweight block ciphers that are suitable for low resource devices such as radio-frequency identification tags. In this paper, we present the first biclique cryptanalysis of MIBS block cipher and a new biclique cryptanalysi