Discover more insights into Random Oracles 随机预言机

Keywords frequently search together with Random Oracles 随机预言机

Narrow sentence examples with built-in keyword filters

Random Oracles sentence examples within Without Random Oracles

RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud

Post-quantum secure multi-party private set-intersection in star network topology

Random Oracles sentence examples within random oracles according

Mitigating Both Data Corruption and Content Replay Attacks with Implicit Data Integrity

IVP: A Three Level Confusion-Diffusion Network Supporting Implicit Data Integrity

Short Identity-Based Signatures with Tight Security from Lattices

The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography

CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model

Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability

Blockchain-Envisioned Trusted Random Oracles for IoT-Enabled Probabilistic Smart Contracts

Constructing provable secure broadcast encryption scheme with dealership

Generic construction for tightly-secure signatures from discrete log

Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption

A New Delegated Authentication Protocol based on PRE

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware

TARDIS: A Foundation of Time-Lock Puzzles in UC

An alternative approach to public cloud data auditing supporting data dynamics

Verifier-based anonymous password-authenticated key exchange protocol in the standard model.

Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC

Key regression from constrained pseudorandom functions

Quadratic Time-Space Lower Bounds for Computing Natural Functions with a Random Oracle

A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared Secrets

Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions

Group Signatures without NIZK: From Lattices in the Standard Model

Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE

Signcryption from NTRU Lattices Without Random Oracles

How to Sign with White-Boxed AES

A New Certificateless Signature Scheme Provably Secure in the Standard Model

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search

Communication Complexity of Byzantine Agreement, Revisited

Learn more from Random Oracles 随机预言机

Random Oracles 随机预言机

Random Oracles 随机预言机
Encyclopedia 百科全书