Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ecurity proof of Sakai-Kasahara's identity-based encryption scheme|journal=Cryptography ePrint Archive|volume=2005/226|url=http://eprint.iacr.org/2005/226.pdf}}</r ...nyone to encrypt a message to a user when the sender only knows the public identity (e.g. email address) of the user. In this way, this scheme removes the requ ...
    10 KB (1,576 words) - 07:26, 31 July 2024
  • ...ryptography, as [[key exchange]] protocols, [[ID-based encryption|identity-based encryption]], and [[broadcast encryption]]. There exist constructions of cr ...rstand than GGH13 multilinear map; and GGH15,<ref name="ggh15" /> which is based on graphs. ...
    7 KB (1,053 words) - 19:57, 10 December 2024
  • .../math> to be equal to <math>x</math> when <math>k</math> corresponds to an identity that is allowed to decrypt, and <math>\perp</math> otherwise. Similarly, in ...<ref>{{cite web|last=Sahai|first=Amit|author2=Brent Waters|title=Attribute-Based Encryption for Circuits from Multilinear Maps|year=2012 |arxiv=1210.5287 |u ...
    5 KB (648 words) - 16:12, 30 November 2024
  • ...], [[Diffie–Hellman key exchange]] and [[elliptic curve cryptography]] are based on number theory and hence depend on commutative algebraic structures. #Bob checks if ''w'' ' ' = ''t''<sup>''r''</sup>. If this true, then the identity of Alice is established. ...
    12 KB (1,946 words) - 01:33, 29 June 2024
  • ...[[computational number theory]] and have been applied in [[elliptic-curve cryptography]]. Their vertices represent [[supersingular elliptic curve]]s over [[finite ...h|expansion properties]] for their degree.{{r|clg|fjp|p1|p2}} The proof is based on [[Pierre Deligne]]'s proof of the [[Ramanujan–Petersson conjecture]].{{r ...
    6 KB (809 words) - 04:48, 30 November 2024
  • ...Technical-White-Paper-06-with-Appendix-A-B.pdf |title=Algebraic methods in cryptography |publisher=American Mathematical Society |location=Contemp. Math. |volume=4 ...</math>, that is, the result of E-Multiplication of the private matrix and identity-permutation with the private braid. ...
    11 KB (1,668 words) - 00:27, 19 October 2022
  • {{Short description|Family of elliptic curves used in cryptography}} ...ed in [[elliptic curve cryptography]]. Applications of Edwards curves to [[cryptography]] were developed by [[Daniel J. Bernstein]] and [[Tanja Lange]]: they point ...
    18 KB (2,963 words) - 11:45, 10 January 2025
  • ...phy|cryptographic]] weakness that allows the private key of a [[Public-key cryptography|key pair]] to be recovered from the public key in keys generated by devices ...lnerable RSA generation (CVE-2017-15361) |publisher=Centre for Research on Cryptography and Security, Faculty of Informatics, [[Masaryk University]] |location=Czec ...
    10 KB (1,364 words) - 03:49, 15 January 2025
  • ...by the [[elliptic curve|Weierstrass equation]]. Sometimes it is used in [[cryptography]] instead of the Weierstrass form because it can provide a defence against ...elliptic curve: this operation is considered the most in [[elliptic curve cryptography]]. ...
    18 KB (2,905 words) - 13:54, 10 March 2024
  • ...-(Here is a description of these problems: given a word w representing the identity in a finitely presented group, find a ...2.3734 Generic Complexity and One-Way Functions]'', Groups, Complexity and Cryptography, 1, (2009), 13–31.</ref> which yields the same class of functions but allow ...
    18 KB (2,774 words) - 16:11, 31 May 2024
  • ...]]. It assumes that the quantum memory device of an attacker ([[Adversary (cryptography)|adversary]]) trying to break the protocol is imperfect (noisy). ...curity then holds as long as these assumptions are satisfied. In classical cryptography, i.e., without the use of quantum tools, most of these are [[Computational ...
    22 KB (3,003 words) - 01:14, 25 December 2024
  • ...rmore, we can prove that the signature scheme is secure under well known [[Cryptography|cryptographic]] assumptions of the hardness of the [[discrete logarithm]] p ===Elliptic curves cryptography over a finite field=== ...
    16 KB (2,792 words) - 10:58, 19 August 2024
  • ...onal sender and recipient untraceability. Anonymous communication networks based on this problem are often referred to as '''DC-nets''' (where DC stands for ...have paid the bill). Otherwise, one of the cryptographers paid, but their identity remains unknown to the other cryptographers. ...
    16 KB (2,357 words) - 18:15, 8 May 2024
  • In [[cryptography]], an '''accumulator''' is a [[one way function|one way]] membership [[hash ...ss=free}}</ref> Benaloh and de Mare proposed an alternative scheme in 1991 based on discretizing time into rounds.<ref name=":0" /><ref>{{Cite web |last1=Be ...
    18 KB (2,858 words) - 23:27, 26 January 2025
  • .../www.kaspersky.co.uk/blog/cybersecurity-case-study/8067/}}</ref> A browser-based prototype of the system was used in a Durga Puja online voting trial among ...ent in <math>G_q</math> as <math>g_1</math> and computing <math>g_2</math> based on applying a one-way hash function with the inclusion of election specific ...
    12 KB (1,867 words) - 22:36, 14 February 2025
  • ...n [[elliptic curve]] to itself repeatedly. It is used in [[elliptic curve cryptography]] (ECC). Point at infinity {{tmath|\mathcal{O} }} is the [[identity element]] of elliptic curve arithmetic. Adding it to any point results in t ...
    32 KB (4,769 words) - 10:06, 13 February 2025
  • ...h|''S''}}. [[Threshold cryptosystem|Threshold]] [[secret sharing]] schemes based on the CRT are due to Mignotte and Asmuth–Bloom, they use special sequences By [[Bézout's identity]], since <math>(m_i,M/m_i) = 1</math>, there exist positive integers {{math ...
    12 KB (1,923 words) - 17:25, 23 November 2023
  • ...information, i.e., break the [[RSA (algorithm)|RSA]] system. This break is based on Wiener's theorem, which holds for small values of ''d''. Wiener has prov By using simple [[algebra]]ic manipulations and [[identity (mathematics)|identities]], a guess can be checked for [[accuracy]].<ref na ...
    12 KB (1,751 words) - 15:49, 21 February 2025
  • ...and Bob) in order to allow reliable [[quantum teleportation]] or [[quantum cryptography]]. | title = Quantum privacy amplification and the security of quantum cryptography over noisy channels ...
    41 KB (6,146 words) - 05:13, 19 December 2024
  • ...hould not forget about fields of characteristic 2 as [[hyperelliptic curve cryptography]] makes extensive use of such fields. ...et of points of a hyperelliptic curve. The group law on elliptic curves is based on the fact that a straight line through two points lying on an elliptic cu ...
    31 KB (5,758 words) - 00:43, 11 December 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)