<--- Back to Details
First PageDocument Content
Hidden Field Equations / Unbalanced Oil and Vinegar / Full Domain Hash / RSA / Digital signature / One-way function / Cryptography / Public-key cryptography / Post-quantum cryptography
Date: 2013-12-30 04:23:42
Hidden Field Equations
Unbalanced Oil and Vinegar
Full Domain Hash
RSA
Digital signature
One-way function
Cryptography
Public-key cryptography
Post-quantum cryptography

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 459,14 KB

Share Document on Facebook

Similar Documents

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

DocID: 1gs9P - View Document

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1  2

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

DocID: 1atOP - View Document

SPEcTRe: Spot-checked Private Ecash Tolling at Roadside Jeremy Day Yizhou Huang  Edward Knapp

SPEcTRe: Spot-checked Private Ecash Tolling at Roadside Jeremy Day Yizhou Huang Edward Knapp

DocID: 19A4N - View Document

Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

DocID: 16pCW - View Document

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

DocID: 15ra5 - View Document