Look before you leap: Secure connection bootstrapping for 5g networks to defend against fake base-stations
The lack of authentication protection for bootstrapping messages broadcast by base-stations
makes impossible for devices to differentiate between a legitimate and a fake base-station …
makes impossible for devices to differentiate between a legitimate and a fake base-station …
Critical perspectives on provable security: Fifteen years of" another look" papers
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …
Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM
Identity-based signatures (IBS) allow the signer's identity information to be used as the
public key for signature verification, eliminating the need for managing certificates to …
public key for signature verification, eliminating the need for managing certificates to …
A Galindo-Garcia-like identity-based signature with tight security reduction, revisited
M Fukumitsu, S Hasegawa - 2018 Sixth International …, 2018 - ieeexplore.ieee.org
Galindo-Garcia identity-based signature (GG09 IBS) is an efficient identity-based signature
(IBS) based on Schnorr signature scheme. The security of GG09 IBS is proven in the random …
(IBS) based on Schnorr signature scheme. The security of GG09 IBS is proven in the random …
Identity-Based Signature from Lattices Without Trapdoors
Currently, the majority of lattice-base identity-based signature (LB-IBS) schemes rely on
lattice trapdoor technique introduced by Gentry, Peikert, and Vaikuntanathan. However, this …
lattice trapdoor technique introduced by Gentry, Peikert, and Vaikuntanathan. However, this …
A hess-like signature scheme based on implicit and explicit certificates
The main goal of introducing an identity-based cryptosystem and certificateless
cryptosystem was avoiding certificates' management costs. In turn, the goal of introducing a …
cryptosystem was avoiding certificates' management costs. In turn, the goal of introducing a …
On performance of parallel iSCSI protocol for networked storage systems
QK Yang - … Information Networking and Applications-Volume 1 …, 2006 - ieeexplore.ieee.org
A newly emerging protocol for storage networking, iSCSI [1, 2], was recently ratified by the
Internet Engineering Task Force [3]. The iSCSI protocol is perceived as a low cost alternative …
Internet Engineering Task Force [3]. The iSCSI protocol is perceived as a low cost alternative …
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM
Identity-based signatures (IBS) can be verified using the signer identity information as the
public key, and hence, there is no need for certificate management that proves the …
public key, and hence, there is no need for certificate management that proves the …
A Galindo-Garcia-like identity-based signature with tight security reduction
M Fukumitsu, S Hasegawa - 2017 Fifth International …, 2017 - ieeexplore.ieee.org
Galindo and Garcia proposed an identity-based signature based on the Schnorr signature.
Although their scheme is proven to be secure in the random oracle model, the security …
Although their scheme is proven to be secure in the random oracle model, the security …
A Closer Look at Multiple Forking: Leveraging (In)Dependence for a Tighter Bound
S Chatterjee, C Kamath - Algorithmica, 2016 - Springer
Abstract Boldyreva, Palacio and Warinschi introduced a multiple forking game as an
extension of general forking. The notion of (multiple) forking is a useful abstraction from the …
extension of general forking. The notion of (multiple) forking is a useful abstraction from the …