Succinct {Non-Interactive} zero knowledge for a von neumann architecture
We build a system that provides succinct non-interactive zero-knowledge proofs (zk-
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …
An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings
NW Lo, JL Tsai - IEEE Transactions on Intelligent …, 2015 - ieeexplore.ieee.org
Constructing intelligent and efficient transportation systems for modern metropolitan areas
has become a very important quest for nations possessing metropolitan cities with ever …
has become a very important quest for nations possessing metropolitan cities with ever …
Secure anonymous key distribution scheme for smart grid
JL Tsai, NW Lo - IEEE transactions on smart grid, 2015 - ieeexplore.ieee.org
To fully support information management among various stakeholders in smart grid
domains, how to establish secure communication sessions has become an important issue …
domains, how to establish secure communication sessions has become an important issue …
Identity-based encryption from the Weil pairing
D Boneh, M Franklin - Annual international cryptology conference, 2001 - Springer
We propose a fully functional identity-based encryption scheme (IBE). The scheme has
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …
[图书][B] Mathematics of public key cryptography
SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …
applications, such as digital signatures. A strong background in the mathematics underlying …
[图书][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …
Short signatures from the Weil pairing
We introduce a short signature scheme based on the Computational Diffie-Hellman
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …
Certificateless public key cryptography
SS Al-Riyami, KG Paterson - International conference on the theory and …, 2003 - Springer
This paper introduces and makes concrete the concept of certificateless public key
cryptography (CL-PKC), a model for the use of public key cryptography which avoids the …
cryptography (CL-PKC), a model for the use of public key cryptography which avoids the …
Provably secure and lightweight certificateless signature scheme for IIoT environments
In recent years, two technologies, the cloud computing and the Internet of Things (IoT), have
a synergistic effect in the modern organizations as digitization is a new business trend for …
a synergistic effect in the modern organizations as digitization is a new business trend for …
Scalable zero knowledge via cycles of elliptic curves
Non-interactive zero-knowledge proofs of knowledge for general NP statements are a
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …