Attribute-based versions of Schnorr and ElGamal
نویسندگان
چکیده
منابع مشابه
task-based instruction, consciousness-raising and iranian efl learners acquisition and use of collocation
the present study sought to examine whether a task-based approach could have an impact on raising awareness of collocations. moreover, it sought to investigate the facilitative role of consciousness-raising tasks of collocations in the communicative instances of use. to this end, 68 intermediate learners of english were selected via a placement test. the participants were taught with classroom ...
15 صفحه اولSigncryption scheme based on schnorr digital signature
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based o...
متن کاملOn CCA1-Security of Elgamal And Damgård’s Elgamal
We establish the complete complexity landscape surrounding CCA1-security of Elgamal and Damgård’s Elgamal (DEG). Denote by X [i] the assumption that the adversary, given a non-adaptive oracle access to the Y oracle with i free variables cannot break the assumption X . We show that the CCA1-security of Elgamal is equivalent to the DDH assumption. We then give a simple alternative to Gjøsteen’s p...
متن کاملTwin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-mor...
متن کاملOn the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven based on clearly understood and accepted primitives. Here we show directly that the decision Diffie-Hellman assumption implies the security of the original ElGamal encryption scheme (with messages from a subgroup) withou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applicable Algebra in Engineering, Communication and Computing
سال: 2015
ISSN: 0938-1279,1432-0622
DOI: 10.1007/s00200-015-0270-7