A modular analysis of the Fujisaki-Okamoto transformation
Abstract The Fujisaki-Okamoto (FO) transformation (CRYPTO 1999 and Journal of
Cryptology 2013) turns any weakly secure public-key encryption scheme into a strongly (ie …
Cryptology 2013) turns any weakly secure public-key encryption scheme into a strongly (ie …
Real time pothole detection using android smartphones with accelerometers
The importance of the road infrastructure for the society could be compared with importance
of blood vessels for humans. To ensure road surface quality it should be monitored …
of blood vessels for humans. To ensure road surface quality it should be monitored …
[图书][B] Mathematics of public key cryptography
SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …
applications, such as digital signatures. A strong background in the mathematics underlying …
OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow two parties that
only share a password to establish a shared key in a way that is immune to offline attacks …
only share a password to establish a shared key in a way that is immune to offline attacks …
Secure integration of asymmetric and symmetric encryption schemes
E Fujisaki, T Okamoto - Journal of cryptology, 2013 - Springer
This paper presents a generic conversion from weak asymmetric and symmetric encryption
schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …
schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …
[图书][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing
Mobile crowdsensing engages a crowd of individuals to use their mobile devices to
cooperatively collect data about social events and phenomena for customers with common …
cooperatively collect data about social events and phenomena for customers with common …
P2P mixing and unlinkable bitcoin transactions
Abstract Starting with Dining Cryptographers networks (DC-net), several peer-to-peer (P2P)
anonymous communication protocols have been proposed. Despite their strong anonymity …
anonymous communication protocols have been proposed. Despite their strong anonymity …
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
In this paper we consider anonymity in the context of Broadcast Encryption (BE). This issue
has received very little attention so far and all but one of the currently available BE schemes …
has received very little attention so far and all but one of the currently available BE schemes …
[PDF][PDF] 国密SM9 数字签名和密钥封装算法的安全性分析
赖建昌, 黄欣沂, 何德彪, 伍玮 - 中国科学: 信息科学, 2021 - scis.scichina.com
摘要安全性分析为密码方案的安全性提供重要依据和有力保障. 我国自主设计的商用标识密码
SM9 已成为国家标准, 其中, SM9 数字签名算法和加密算法已成为ISO/IEC 国际标准. 然而 …
SM9 已成为国家标准, 其中, SM9 数字签名算法和加密算法已成为ISO/IEC 国际标准. 然而 …