1 Introduction Blind signature allows a user to obtain the signature of a message from a signer without revealing the information of the message,as well as defending against *** recent years,there have been increased ...
详细信息
1 Introduction Blind signature allows a user to obtain the signature of a message from a signer without revealing the information of the message,as well as defending against *** recent years,there have been increased efforts to design post-quantum blind signature schemes,since it is known that classical cryptography assumptions(e.g.,integer factoring problem and discrete logarithm problem)are not secure against attacks carried out using quantum computers[1].One popular approach is to design blind signature schemes using *** first lattice-based blind signature scheme is proposed by Rückert[2],who also presented a general process of constructing lattice-based blind signature influenced by Lyubashevskys’s secure framework[3].Rückert’s approach achieves both blindness and one-more unforgeability in the random oracle *** then,many other blind signature schemes have extended Rückert signature *** example,based on Crystals-Dilithium[4](one of the NIST post-quantum signature standardization),Le et al.[5]created a blind signature from module lattices.
With the continuous development of Industry 4.0 technology, the embedded devices in Industrial Internet of Things (IIoT) are showing explosive growth, and large-scale cyber attacks or related security incidents contin...
详细信息
Emotions are essential to social interaction between interlocutors. It provides essential meaning to social interaction. It is important to recognise emotions along with verbal cues to fully understand the true meanin...
详细信息
Cross-Site Request Forgery (CSRF) is a prominent web exploit that continues to pose significant security risks, even on highly ranked websites. This research focuses on identifying the underlying vulnerability, unders...
详细信息
Cloud computing is a distributed infrastructure that centralizes server resources on a platform in order to provide services over the internet. Traditional public-key encryption protects data confidentiality in cloud ...
详细信息
In wealthy nations, the demand for electrical energy is steadily increasing, despite the scarcity of available resources. Considering that individuals spend approximately 80% of their lives indoors, it is imperative t...
详细信息
Phishing is a form of cyber-attack that uses social engineering techniques to trick individuals into providing sensitive information or clicking on malicious links, often through email or text messages. Social enginee...
详细信息
Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can be successfully determined by utilizing metaheuristic techniques. Monoalphabetic cryptosystem is one of the famous classic...
详细信息
This paper aims to use an experimental approach to determine the best performing and most stable web programming languages for building a website. Through a comprehensive comparison of different languages such as Gola...
详细信息
At this time, the development of information and communication technology has mostly been used maximally to improve the quality of life of citizens around the world. The benefits that are obtained make some cities evo...
详细信息
暂无评论