نتایج جستجو برای: position based cryptography

تعداد نتایج: 3129196  

2008
David Stephen Freeman

Constructing Abelian Varieties for Pairing-Based Cryptography

Journal: :New Generation Computing 2021

Abstract Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation with just a deck of cards. For the sake simplicity, this is often done using cards only two symbols, e.g., $$\clubsuit $$ ♣ $$\heartsuit ♡ . Within paper, we also target se...

Journal: :isecure, the isc international journal of information security 0
p. rastegari department of electrical and computer engineering, isfahan university of technology, isfahan, iran m. berenjkoub department of electrical and computer engineering, isfahan university of technology, isfahan, iran

certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...

Journal: :Journal of Optics B: Quantum and Semiclassical Optics 2000

Journal: :IEEE journal on selected areas in information theory 2021

We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain secure post-quantum cryptography at high communication rates. The scheme we offer is in the sense that it combines information-theoretic security with public-key cryptography. In addition, general and can be applied any network, cryptosystem. Our based on information theoretic notion of individual secrecy, which t...

Journal: :DEStech Transactions on Computer Science and Engineering 2017

Journal: :Trends in Applied Sciences Research 2012

Journal: :IEEE Circuits and Systems Magazine 2001

Journal: :New Generation Computing 2021

Abstract It is known that secure computation can be done by using a deck of physical cards. This area called card-based cryptography. Shinagawa et al. (in: Provable security—9th international conference, ProvSec 2015, Kanazawa, Japan, 2015) proposed regular n -sided polygon cards enable to compute functions over $${\mathbb {Z}}/n{\mathbb {Z}}$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/M...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید