搜索结果: 1-15 共查到“军事学 Remarks”相关记录15条 . 查询时间(0.109 秒)
Quantum entanglement is of great importance to quantum cryptography and computation. So far, all experimental demonstrations of entanglement are designed to check Bell's inequality which is based on B...
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project
Diffie-Hellman key agreement NIST PQC Project
2018/1/2
In November 2017, Juan edro Hecht and Jorge Alejandro Kamlofsky submitted a quaternions/octonions based Diffie-Hellman key agreement protocol HK17 to NIST post quantum cryptography project. Daniel J. ...
Remarks on the Pocklington and Padr?S醗z Cube Root Algorithm in $\mathbb F_q$
cube root algorithm finite field Pocklington algorithm
2016/1/25
We clarify and generalize a cube root algorithm in Fq proposed by Pocklington [1],
and later rediscovered by Padr磑 and S碼ez [2]. We correct some mistakes in [2] and give
a full generalization of the...
Some Remarks on Honeyword Based Password-Cracking Detection
authentication password security honeywords
2016/1/23
Recently, Juels and Rivest proposed honeywords (decoy passwords) to detect attacks against hashed password databases. For each user account, the legitimate password is stored with several honeywords...
Remarks on the Cryptographic Primitive of Attribute-based Encryption
Attribute-based encryption one-to-one encryption one-to-many encryption
2016/1/7
Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based
on user attributes is a type of one-to-many encryption. Unlike the conventional one-to-one encryption
which ...
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
Shor's factoring algorithm quantum modular exponentiation superposition
2016/1/6
An efficient quantum modular exponentiation method is indispensible for Shor's factoring algorithm. But we find that all descriptions presented by Shor, Nielsen and Chuang, Markov and Saeedi, et al., ...
SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
logarithmic signatures quasi-logarithmic signatures cyclic 2-group
2015/12/22
In the paper about the cryptosystem MST3, Svaba and Trung proposed
a way to build a cryptosystem based on the concept of logarithmic signatures,
and they choose Suzuki’s group, which is not abelian ...
Remarks about the Security Proofs of Boneh-Franklin’s Identity-Based Encryption
Security Proofs Boneh-Franklin’s Identity-Based Encryption
2010/3/16
Boneh and Franklin constructed the first practical
Identity-Based Encryption (IBE) scheme in 2001. They also
defined a formal security model for IBE and proved their
scheme (BF-IBE) to be secure in...
Remarks on Some Quantum Cryptographic Schemes
quantum key establishment quantum secret sharing BB84 scheme
2009/11/18
We remark that the schemes [PhysRevLett.98.020503, PhysRevA.74.012315,
PhysRevA.71.022321, PhysRevA.72.012304, PhysRevA.69.052307, PhysRevA.59.1829]
are not secret sharing schemes as claimed.
Remarks on One Arbitrated Quantum-signature Scheme
quantum digital signature blind signature arbitrator
2009/6/15
Zeng and Keitel proposed an arbitrated quantum signature scheme In 2002.
Recently, Curty and LÄutkenhaus pointed out that the protocol is not operationally
specified. In a reply, Zeng gave more...
Remarks on the Attack of Fouque et al. against the `IC Scheme
Attack Fouque et al. IC Scheme
2009/6/4
In 2007, `-Invertible Cycles (`IC) was proposed by Ding et
al. This is one of the most efficient trapdoors for encryption/signature
schemes, and of the mixed field type for multivariate quadratic pu...
In this contribution we investigate practical issues with imple-
menting the NFS algorithm to solve the DLP arising in XTR-based cryptosys-
tems. We can transform original XTR-DLP to a DLP instance ...
Remarks on Saeednia’s Identity-based Society Oriented Signature Scheme with Anonymous Signers
cryptography digital signatures identity-based attacks
2009/4/8
Recently, based on Guillou-Quisquater signature scheme, Saeednia
proposed an identity-based society oriented signature scheme. However,
in this note, we point out that Saeednia’s scheme does not sat...
Remarks on “Analysis of One Popular Group Signature Scheme” in Asiacrypt 2006
Popular Group Signature Scheme Asiacrypt
2009/1/7
In [3], a putative framing “attack” against the ACJT group
signature scheme [1] is presented. This note shows that the attack framework
considered in [3] is invalid. As we clearly illustrate, there...
REMARKS ON IBE SCHEME OF WANG AND CAO
Public-Key Encryption Identity-Based Encryption (IBE) IND-ID-CCA
2008/5/26
In this paper we analyze and find an anomaly in the security proof of the
identity-based encryption (IBE) scheme fullM-IBE of Wang and Cao [9], which is based
on mBDHP. Here we give another proof fo...