New identity-based identification and signature schemes in the standard model
In this paper, we propose an efficient identity-based identification (IBI) scheme provably
secure against impersonation under active and concurrent attacks in the standard model …
secure against impersonation under active and concurrent attacks in the standard model …
[HTML][HTML] A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
The security of cryptographic schemes is proven secure by reducing an attacker which
breaks the scheme to an algorithm that could be used to solve the underlying hard …
breaks the scheme to an algorithm that could be used to solve the underlying hard …
Pluggable Authentication Module Meets Identity-Based Identification
Pluggable authentication modules (PAMs) primarily provide authentication services to
system software on a machine. PAM simplifies the job for both software developers and …
system software on a machine. PAM simplifies the job for both software developers and …
OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit Loss
Tightening the security reduction of a cryptosystem involves reducing the advantage of an
adversary breaking the cryptosystem to a security assumption as closely as possible. Tighter …
adversary breaking the cryptosystem to a security assumption as closely as possible. Tighter …
Evaluating pairing-free identity-based identification using curve25519
Identification schemes are cryptographic primitives that enable strong authentication for
access control mechanisms that are critical to the security of computerized systems. To …
access control mechanisms that are critical to the security of computerized systems. To …
Strategies Security Managers Used to Prevent Security Breaches in SCADA Systems' Networks
O Ogunmesa - 2021 - search.proquest.com
Abstract Supervisory Control and Data Acquisition (SCADA) systems monitor and control
physical processes in critical infrastructure. The impact of successful attacks on the SCADA …
physical processes in critical infrastructure. The impact of successful attacks on the SCADA …
[PDF][PDF] Group Identity-Based Identification: Definitions, Construction and Implementation
As an extension of identification schemes in multiparty setting, we propose the first
definitions and construction for a Group Identity-Based Identification (Group-IBI) scheme …
definitions and construction for a Group Identity-Based Identification (Group-IBI) scheme …
[PDF][PDF] A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures. Symmetry 2021, 13, 1330
The security of cryptographic schemes is proven secure by reducing an attacker which
breaks the scheme to an algorithm that could be used to solve the underlying hard …
breaks the scheme to an algorithm that could be used to solve the underlying hard …