Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Veronika Kuchta"'
Autor:
Maxime Buser, Rafael Dowsley, Muhammed Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason Legrow, Joseph Liu, Raphaël Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu
Publikováno v:
ACM Computing Surveys. 55:1-32
Blockchain technology provides efficient and secure solutions to various online activities by utilizing a wide range of cryptographic tools. In this article, we survey the existing literature on post-quantum secure digital signatures that possess exo
Publikováno v:
Designs, Codes and Cryptography. 89:925-963
In this work, we propose new lattice-based protocols which are used to prove additive and multiplicative relations of committed integers. We introduce three new protocols. The first protocol proves additive relation of integers. In this framework, we
Publikováno v:
Progress in Cryptology-AFRICACRYPT 2022 ISBN: 9783031174322
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9c685b9087d255e7a35aa29696fa1bef
https://doi.org/10.1007/978-3-031-17433-9_11
https://doi.org/10.1007/978-3-031-17433-9_11
Autor:
Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphaël C.-W. Phan, Zhenfei Zhang
Publikováno v:
Computer Security – ESORICS 2022 ISBN: 9783031171390
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6de05a33a7a3f89c2d5044b5ebc4c39e
https://doi.org/10.1007/978-3-031-17140-6_2
https://doi.org/10.1007/978-3-031-17140-6_2
Autor:
Gaurav Sharma, Veronika Kuchta
Publikováno v:
IoT Security
In this chapter, a secure digital remote patient monitoring solution is introduced. With this solution, a patient could be monitored and served remotely; health services could be provided to people far away from hospitals and by experts not necessari
Publikováno v:
Journal of Hardware and Systems Security. 3:12-25
Since the last decade, the public-key encryption with keyword search (PEKS) has been studied as a popular technique for searching data over encrypted files. The notion finds useful application for fine-grained data search on outsourced encrypted data
Publikováno v:
Selected Areas in Cryptography ISBN: 9783030816513
SAC
SAC
In this paper we provide an efficient construction of a lattice-based polynomial argument and a polynomial batch-protocol, where the latter contains the polynomial argument as a building block. Our contribution is motivated by the discrete log based
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2454a73a9a4923f3181635d3d83f6639
https://doi.org/10.1007/978-3-030-81652-0_1
https://doi.org/10.1007/978-3-030-81652-0_1
Autor:
Veronika Kuchta, Muhammed F. Esgin, Amin Sakzad, Zhenfei Zhang, Ron Steinfeld, Shi-Feng Sun, Shumo Chu
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662643303
Financial Cryptography (2)
Financial Cryptography (2)
In this work, we introduce the first practical post-quantum verifiable random function (VRF) that relies on well-known (module) lattice problems, namely Module-SIS and Module-LWE. Our construction, named LB-VRF, results in a VRF value of only 84 byte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c01841d68cd9bcad5c3d664f8776f134
https://doi.org/10.1007/978-3-662-64331-0_29
https://doi.org/10.1007/978-3-662-64331-0_29
Publikováno v:
Information Security and Cryptology ISBN: 9783030429201
Inscrypt
Inscrypt
In this paper, we construct a revocable and linkable ring signature (RLRS) scheme, which enables a revocation authority to revoke the anonymity of the real signer in linkable ring signature scheme under any circumstances. In other words, the revocabi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b742866eb9e234c1a2d35752b63768dc
https://doi.org/10.1007/978-3-030-42921-8_1
https://doi.org/10.1007/978-3-030-42921-8_1
Autor:
Soultana Ellinidou, Veronika Kuchta, Rajeev Anand Sahu, Jean-Michel Dricot, Olivier Markowitch, Suman Bala, Gaurav Sharma
Publikováno v:
Transactions on Emerging Telecommunications Technologies, 30 (6
A symmetric group key agreement protocol enables the group members to derive a shared session key for secure communication among them, whereas an asymmetric one facilitates security to any communication from outside, without adding outsiders into the