搜索结果: 1-15 共查到“军事学 Digital”相关记录70条 . 查询时间(0.269 秒)
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
digital signatures hash functions public-key cryptography
2019/6/10
A new hash-based, server-supported digital signature scheme was proposed recently. We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the ...
Subliminal channels in post-quantum digital signature schemes
Subliminal channels post-quantum digital signatures
2019/5/29
We analyze the digital signatures schemes submitted to NIST's Post-Quantum Cryptography Standardization Project in search for subliminal channels.
We present a pairing-based signature scheme for use in blockchains that achieves substantial savings in bandwidth and storage requirements while providing strong security guarantees. Our signature sch...
The Lattice-Based Digital Signature Scheme qTESLA
Post-quantum cryptography lattice-based cryptography digital signatures
2019/1/29
We present qTESLA, a family of post-quantum digital signature schemes based on the ring learning with errors (R-LWE) problem that exhibits several attractive features such as simplicity, high-performa...
Non-malleable Digital Lockers
Digital Lockers Point obfuscation Virtual black-box obfuscation
2018/11/6
An obfuscated program reveals nothing about its design other than its input/output behavior. A digital locker is an obfuscated program that outputs a stored cryptographic key if and only if a user ent...
Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies
ring signatures confidential transactions spender ambiguity
2018/8/28
We present threshold ring multi-signatures (thring signatures) for collaborative computation of ring signatures, discuss a game of existential forgery for thring signatures, and discuss the uses of th...
FairSwap: How to fairly exchange digital goods
Fair Exchange Smart Contracts Provable Security
2018/8/16
We introduce FairSwap -- an efficient protocol for fair exchange of digital goods using smart contracts. A fair exchange protocol allows a sender S to sell a digital commodity x for a fixed price p to...
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
Tight security digital signatures Fiat-Shamir
2018/6/5
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose cryptographic parameters in a way that is supported by a security proof, without the need to sacrif...
PRCash: Centrally-Issued Digital Currency with Privacy and Regulation
Cryptocurrency Blockchain Privacy
2018/5/11
Decentralized cryptocurrencies based on blockchains provide attractive features, including user privacy and system transparency, but lack active control of money supply and capabilities for regulatory...
AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM
WalnutDSA group-based cryptography digital signature
2018/5/2
In this paper, we analyze security properties of the WalnutDSA, a digital signature algorithm recently proposed by I. Anshel, D. Atkins, D. Goldfeld, and P. Gunnels,that has been accepted by the Natio...
This paper proposes DeepMarks, a novel end-to-end framework for systematic fingerprinting in the context of Deep Learning (DL). Remarkable progress has been made in the area of deep learning. Sharing ...
Practical attacks against the Walnut digital signature scheme
NIST PQC post-quantum digital signatures cryptanalysis
2018/4/9
Recently, NIST started the process of standardizing quantum- resistant public-key cryptographic algorithms. WalnutDSA, the subject of this paper, is one of the 20 proposed signature schemes that are b...
A digital signature scheme (DSS), which consists of a key-generation, a signing, and a verification algorithm, is an invaluable tool in cryptography. The first and still most widely used security defi...
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change
Digital money group blind signature double spending
2017/12/25
Several ecash systems have been proposed in the last twenty years or so,each offering features similar to real cash. One feature which to date has not been provided is that of a payee giving change to...
Battlefield Geometry in our Digital Age: From Flash to Bang in 22 Milliseconds
Battlefield Geometry Digital Age The New Battlefield
2019/10/22
This year has been tough for cybersecurity programs. Every month in the first six months of 2017, the world experienced a major cyber event. Open-source attacks included attacks on critical infrastruc...