نتایج جستجو برای: position based cryptography

تعداد نتایج: 3129196  

Journal: :Cryptography 2023

Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, such as predicting weather, finding directions, classifying images and videos, even automatically generating code, text, videos. Other essential technologies blockchain cybersecurity also benefit from AI. As core component used cybersecurity, cryptography can AI order to enhance the confidentiali...

Due to the fast development in information and communication technology, new challenging problems appear in the security. So, it is important and vital that the scientific society of our country focuses on research and studies these problems and by providing new proposal try to respond to these critical needs of our country. Hence, our aim in this paper is to study and highlight one of the impo...

2002
Craig Gentry Alice Silverberg

We present hierarchical identity-based encryption schemes and signature schemes that have total collusion resistance on an arbitrary number of levels and that have chosen ciphertext security in the random oracle model assuming the difficulty of the Bilinear Diffie-Hellman problem.

2014
Takaaki Mizuki Hiroki Shizuya

It is known that secure multi-party computations can be achieved using a number of black and red physical cards (with identical backs). In previous studies on such card-based cryptographic protocols, typically an ideal situation where all players are semi-honest and all cards of the same suit are indistinguishable from one another was assumed. In this paper, we consider more realistic situation...

2006
Kartik Audhkhasi

This paper shall discuss the design of a Chaos based symmetric key cryptosystem. The structure of two contemporary symmetric key encryption schemes using the Logistic map is discussed and their performance is evaluated based on a battery of tests and some qualitative measures. It is deduced that one scheme performs far better than the other. It is then experimentally shown that the performance ...

emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...

1998
JAMES F. ANNETT

Over the past three years or so the evidence has become overwhelming that the cuprate high Tc superconductors have a d-wave pairing state[1]. The measurements of Wollman et al.[2] and of Tsuei et al.[3] are especially convincing since they do not depend on the microscopic physics of the energy gap, but instead depend only on the order parameter phase. Other experiments, such as photoemission[4,...

2010
Abdullah M. Jaafar Azman Samsudin

Currently, most of the existing public-key encryption schemes are based on complex algorithms with heavy computations. In 1994, Naor and Shamir proposed a simple cryptography method for digital images called visual cryptography. Existing visual cryptography primitives can be considered as a special kind of secret-key cryptography that does not require heavy computations for encrypting and decry...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید