Articles with "signature schemes" as a keyword



Photo from wikipedia

Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2018.2833119

Abstract: Although postquantum cryptography is of growing practical concern, not many works have been devoted to implementation security issues related to postquantum schemes. In this paper, we look in particular at fault attacks against implementations of… read more here.

Keywords: exchange protocols; key exchange; lattice based; signature schemes ... See more keywords

Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2020.3042070

Abstract: Digital signature is a major component of transactions on Blockchain platforms, especially in enterprise Blockchain platforms, where multiple signatures from a set of peers need to be produced to endorse a transaction. However, such process… read more here.

Keywords: multi signature; signature schemes; signature; enterprise blockchain ... See more keywords
Photo by lucabravo from unsplash

Provably Secure Group Signature Schemes From Code-Based Assumptions

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2020.2976073

Abstract: We solve an open question in code-based cryptography by introducing two provably secure group signature schemes from code-based assumptions. Our basic scheme satisfies the CPA-anonymity and traceability requirements in the random oracle model, assuming the… read more here.

Keywords: code based; signature schemes; provably secure; group signature ... See more keywords

A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2021.3131668

Abstract: Basic security requirements such as confidentiality, user authentication and data integrity, are assured by using public-key cryptography (PKC). In particular, public-key signature schemes provide non-repudiation, integrity of transmitted messages and authentication. The presence of a… read more here.

Keywords: public key; post quantum; signature schemes;