A framework for non-interactive instance-dependent commitment schemes (NIC)

被引:0
|
作者
Kapron, Bruce [1 ]
Malka, Lior [1 ]
Srinivasan, Venkatesh [1 ]
机构
[1] Department of Computer Science, University of Victoria, BC,V8W 3P6, Canada
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 15
相关论文
共 40 条
  • [21] Non-interactive Security Framework for Mobile Device based Academic Monitoring System
    Muthusenthil, B.
    Vijayakumaran, C.
    Kim, Hyunsung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 265 - 276
  • [22] A discrete-logarithm based non-interactive non-malleable commitment scheme with an online knowledge extractor
    Ding, Ning
    Gu, Dawu
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 153 - 166
  • [23] Non-interactive and Non-malleable Commitment Scheme Based on q-one Way Group Homomorphisms
    张宗洋
    董晓蕾
    曹珍富
    Journal of Shanghai Jiaotong University(Science), 2008, (05) : 574 - 578
  • [24] Non-interactive and non-malleable commitment scheme based on q-one way group homomorphisms
    Zhang Z.-Y.
    Dong X.-L.
    Cao Z.-F.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (5) : 574 - 578
  • [25] On the security of pairing-based non-interactive designated verifier proofs of undeniable signature schemes
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Gan, Che-Sheng
    2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology, STUDENT 2012 - Conference Booklet, 2012, : 207 - 212
  • [26] On the Security of Pairing-Based Non-Interactive Designated Verifier Proofs of Undeniable Signature Schemes
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Gan, Che-Sheng
    2012 IEEE CONFERENCE ON SUSTAINABLE UTILIZATION AND DEVELOPMENT IN ENGINEERING AND TECHNOLOGY (STUDENT), 2012, : 207 - 212
  • [27] Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment
    Kim, Soongohn
    Kim, Seoksoo
    Lee, Geuk
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2009, 25 (03): : 352 - 357
  • [28] A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation
    Kwak, Hyesun
    Lee, Dongwon
    Song, Yongsoo
    Wagh, Sameer
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 403 - 430
  • [29] ID-based cryptographic schemes using a non-interactive public-key distribution system
    Tseng, YM
    Jan, JK
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 237 - 243
  • [30] Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
    Libert, Benoit
    Yung, Moti
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 75 - 93