We can regard the scheme as an application of ELGamal signature scheme in tree-structure signature schemes.WangUnivXYUnivHuiUnivLCUnivChowUnivKPUnivTsangUnivWWUnivChongUnivCFUnivLECT NOTE COMPUT SCIX.Wang,,L.C.K.Hui etc.Secure and Practical Tree-Structure Schemes Based on Discrete Logarithm. ...
Security analysis of information transmission is crucial for practical application. According to Wyner’s wiretap model, it is essential to let the system work at a capacity below the secrecy capacity of the channel. We estimated the secrecy capacity using the error rate from the sampling-checking...
For the possible noise of quantum rotation inside QEnclave on the engineering level, the security definition of UBQC in terms of blindness16permits irrelevant errors to the secret information of the client. That is to say, the UBQC protocol remains secure while there are unrelated errors on top...
The scheme is also efficient, it can be implemented almost as efficiently as the original ELGamal signature scheme. We can regard the scheme as an application of ELGamal signature scheme in tree-structure signature schemes. 展开 关键词: - ...
Calibration curves (or graphs or plots) are the bread and butter of analytical chemistry, and their examination is an important step in any method valida- tion or application. Although the common name of the resulting plot is "calibration curve," analytical chemistry researchers, typi- cally, ...
. . , n where KN (z) denotes knowledge of z. 7. The proof can be implemented through batch proof and verification of knowledge of 1-out-of-k discrete logarithms. ← 19 → Conclusion ◮ The batch proof and verification technique by Chida and Yamamoto is extended. ◮ The new batch ...
The elution volumes Ve usually bear a linear, inverse relationship to the logarithms of molecular weight within a limited molecular weight range, permitting extrapolation to molecular weight unity as a measure of the apparent maximum elution volume Vm. A linear relationship between log Vm/Ve and ...
International conference on the theory and application of cryptographic techniquesPoupard, G., Stern, J.: Security Analysis of a Practical "On the Fly" Authentica- tion and Signature Generation. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 422-436. Springer, Heidelberg (1998...
When designing practical cryptographic protocols, efficient zero-knowledge proofs of knowledge (ZK-PoK) for discrete logarithms and related problems have turned out to be indispensable. On a high level, these are two party protocols between a prover and a verifier which allow the former to convince...
From the analysis, we show that our scheme is valuable for practical application in CCS due to the efficient computation and the scalability of the system. 4.1. Concrete Construction In our construction, we take use of the LSSS access matrix as our access structure. Note that the notation [...