搜索结果: 1-3 共查到“军队指挥学 the CDH assumption”相关记录3条 . 查询时间(0.031 秒)
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption
digital signatures the CDH assumption trapdoor commitments
2017/11/22
We present a signature scheme with the tightest security-reduction among known constant-size signature schemes secure under the computational Diffie-Hellman (CDH) assumption. It is important to reduce...
Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption
Oblivious Transfer Universally Composable Security
2017/10/16
Oblivious Transfer (OT) is a simple, yet fundamental primitive which suffices to achieve almost every cryptographic application. In a recent work (Latincrypt `15), Chou and Orlandi (CO) present the mo...
Unique Signature with Short Output from CDH Assumption
verifiable random function bilinear map random oracle model
2015/12/23
We give a simple and efficient construction of unique signature
on groups equipped with bilinear map. In contrast to prior works,
our proof of security is based on computational Diffie-Hellman probl...