Search
Search Results
-
A note on a standard model for Galois rings
In this work we present a standard model for Galois rings based on the standard model of their residual fields, that is, a a sequence of Galois rings...
-
A conceptually simple and generic construction of plaintext checkable encryption in the standard model
Plaintext-checkable encryption (PCE) can support searches over ciphertext by directly using plaintext. The functionality of a search is modeled by a...
-
Lattice-based autonomous path proxy re-encryption in the standard model
Autonomous path proxy re-encryption (AP-PRE) is a type of PRE that implements control on the delegation path in a multi-hop PRE. AP-PRE forces the...
-
Compact Ring Signatures with Post-Quantum Security in Standard Model
Ring signatures allow a ring member to produce signatures on behalf of all ring users but remain anonymous. At PKC 2022, Chatterjee et al. defined... -
A lightweight identity based generalized signcryption scheme for secure communication in standard model
The implementation of secure communication in the Industrial Internet of Things (IIoT) has made and it is a significant security concern....
-
About C++, C++ Standard, and the C++ Standard Library
We start with the history of the C++ programming language and the C++ Standard library. After that, we briefly describe the C++ Standard Library and... -
Synchronized Aggregate Signature Under Standard Assumption in the Random Oracle Model
An aggregate signature enables to aggregation of multiple signatures generated by different signers on different messages. A synchronized aggregate... -
Lifting Standard Model Reductions to Common Setup Assumptions
In this paper we show that standard model black-box reductions naturally lift to various setup assumptions, such as the random oracle (ROM) or ideal... -
Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model
Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public...
-
Data Standard Construction
Data standardization is a series of work on the definition and implementation of data standards to achieve data value driven business development.... -
Local Services Based on Non-standard Wi-Fi Direct Usage Model
This article discusses a new model for building applied mobile services that use location information and operate in a certain limited spatial area.... -
Standard model leakage-resilient authenticated key exchange using inner-product extractors
With the development of side-channel attacks, a necessity arises to invent authenticated key exchange protocols in a leakage-resilient manner....
-
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions
Dual-receiver encryption (DRE) is a special form of public key encryption (PKE) that allows a sender to encrypt a message for two recipients. Without... -
Forward Secure Lattice-Based Ring Signature Scheme in the Standard Model
A ring signature scheme allows a group member to generate a signature on behalf of the whole group, while the verifier can not tell who computed this... -
-
Identity-based signcryption scheme for medical cyber physical system in standard model
The medical cyber-physical system (MCPS) has recently received massive consideration with the growth of healthcare 4.0. However, maintaining...
-
AVS Point Cloud Compression Standard
The development of point cloud compression standards has become a necessary method for technological development in emerging fields such as... -
Universal Ring Signatures in the Standard Model
Ring signatures allow a user to sign messages on behalf of an ad hoc set of users - a ring - while hiding her identity. The original motivation for... -
Complying with the PCI DSS Standard
It is hard to be in business without making money, so one of the first standards that must be adhered to internationally, is the Payment Card... -
Flexible Group Non-interactive Key Exchange in the Standard Model
In this paper, we constructed a non-interactive group key exchange protocol (GNIKE) with flexibility, i.e., the number of participants in the GNIKE...