نتایج جستجو برای: provable security

تعداد نتایج: 180543  

Journal: :Telecommunication Systems 2013
Chin-Ling Chen Yu-Chung Huang Jehn-Ruey Jiang

Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be addressed. Due to the wireless transmission of the RFID system, malicious people can gain the information in the RFID tags, and the user’s privacy is invaded. Although there have been many...

2004
Nicolas T. Courtois

The object of this paper is the concrete security of recent multivariate signature schemes. A major challenge is to reconcile some ”tricky” ad-hoc constructions that allow to make short signatures, with regular provable security. The paper is composed of two parts. In the first part of this paper we formalize and confront with the most recent attacks the security of several known multivariate t...

2012
Henry Corrigan-Gibbs Bryan Ford

Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and Mix-nets) are too slow for large-scale interactive use. Low-latency systems (e.g., Tor) provide users with alarmingly small anonymity set sizes, especially in heavily monitored networks. We present preliminary work on a new anonymity protocol that makes this anonymity/latency trade-off an explicit ...

Journal: :Theor. Comput. Sci. 2010
Gang Yu Xiaoxiao Ma Yong Shen Wenbao Han

According to actual needs, generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of th...

Journal: :IACR Cryptology ePrint Archive 2017
Ziya Alper Genç Vincenzo Iovino Alfredo Rial

In 2015, Chou and Orlandi presented an oblivious transfer protocol that already drew a lot of attention both from theorists and practitioners due to its extreme simplicity and high efficiency. Chou and Orlandi claimed that their protocol is UC-secure in the random oracle model under dynamic corruptions, which is a very strong security guarantee. Unfortunately, in this work we point out a flaw i...

2006
Shanshan Duan Zhenfu Cao

In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can provide confidentiality and authenticity simultaneously in the multi-receiver setting. We compare our scheme with several multi-receiver constructions from the security and efficiency points of view and argue that our pr...

2006
Kaoru Kurosawa Tsuyoshi Takagi

In this paper, we propose a new approach for constructing selectively convertible undeniable signature schemes, and present two efficient schemes based on RSA. Our approach allows a more direct selective conversion than the previous schemes, and the security can be proved formally. Further, our disavowal protocols do not require parallelization techniques to reach a significant soundness probab...

Journal: :Inf. Process. Lett. 2011
Han-Yu Lin Chien-Lung Hsu Shih-Kun Huang

Article history: Received 26 August 2010 Received in revised form 22 November 2010 Accepted 25 March 2011 Available online 14 April 2011 Communicated by L. Viganò

2006
David C. Conner Howie Choset Alfred A. Rizzi

In this paper, we develop a generic class of control policies that respect nonholonomic constraints and are provably safe with respect to obstacles for a convex-bodied mobile robot. We instantiate this class of policies over local regions of configuration space, and compose the resulting local policies to address the global navigation and control problem for a wheeled mobile robot navigating am...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید