Journal articles on the topic 'Quantum random oracle model'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Quantum random oracle model.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhandry, Mark. "Secure identity-based encryption in the quantum random oracle model." International Journal of Quantum Information 13, no. 04 (June 2015): 1550014. http://dx.doi.org/10.1142/s0219749915500148.
Full textShang, Tao, Ranyiliu Chen, and Qi Lei. "Quantum Random Oracle Model for Quantum Public-Key Encryption." IEEE Access 7 (2019): 130024–31. http://dx.doi.org/10.1109/access.2019.2940406.
Full textHarrow, Aram W., and David J. Rosenbaum. "Uselessness for an Oracle model with internal randomness." Quantum Information and Computation 14, no. 7&8 (May 2014): 608–24. http://dx.doi.org/10.26421/qic14.7-8-5.
Full textGama, Mariana, Paulo Mateus, and André Souto. "A Private Quantum Bit String Commitment." Entropy 22, no. 3 (February 27, 2020): 272. http://dx.doi.org/10.3390/e22030272.
Full textGoncalves, Brian, and Atefeh Mashatan. "Tightly Secure PKE Combiner in the Quantum Random Oracle Model." Cryptography 6, no. 2 (March 29, 2022): 15. http://dx.doi.org/10.3390/cryptography6020015.
Full textBanegas, Gustavo, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, et al. "DAGS: Key encapsulation using dyadic GS codes." Journal of Mathematical Cryptology 12, no. 4 (December 1, 2018): 221–39. http://dx.doi.org/10.1515/jmc-2018-0027.
Full textChen, Lijie, and Ramis Movassagh. "Quantum Merkle Trees." Quantum 8 (June 18, 2024): 1380. http://dx.doi.org/10.22331/q-2024-06-18-1380.
Full textKandii, S. O., and I. D. Gorbenko. "Analysis of DSTU 8961:2019 in the quantum random oracle model." Radiotekhnika, no. 214 (September 29, 2023): 7–16. http://dx.doi.org/10.30837/rt.2023.3.214.01.
Full textColadangelo, Andrea, Christian Majenz, and Alexander Poremba. "Quantum copy-protection of compute-and-compare programs in the quantum random oracle model." Quantum 8 (May 2, 2024): 1330. http://dx.doi.org/10.22331/q-2024-05-02-1330.
Full textYan, Jianhua, Licheng Wang, Lihua Wang, Yixian Yang, and Wenbin Yao. "Efficient Lattice-Based Signcryption in Standard Model." Mathematical Problems in Engineering 2013 (2013): 1–18. http://dx.doi.org/10.1155/2013/702539.
Full textKretschmer, William. "The Quantum Supremacy Tsirelson Inequality." Quantum 5 (October 7, 2021): 560. http://dx.doi.org/10.22331/q-2021-10-07-560.
Full textWang, Hao, Yu Li, and Li-Ping Wang. "Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros." Security and Communication Networks 2022 (July 14, 2022): 1–11. http://dx.doi.org/10.1155/2022/9257443.
Full textGorbenko, Yu I., and S. O. Kandii. "Comparison of security arguments of promising key encapsulation mechanisms." Radiotekhnika, no. 210 (September 28, 2022): 22–36. http://dx.doi.org/10.30837/rt.2022.3.210.02.
Full textLi, Fengyin, Yang Cui, Baogui Huang, Siqi Yu, Peiyu Liu, Yilei Wang, and Tao Li. "A Lamus-Based Flight Data Sharing Model on Consortium Blockchain." Security and Communication Networks 2022 (May 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/5717185.
Full textWei, Lulu, Daofeng Li, and Zhiqiang Liu. "Provable Secure Attribute-Based Proxy Signature Over Lattice Small Integer Solution Problem in Random Oracle Model." Electronics 12, no. 7 (March 30, 2023): 1619. http://dx.doi.org/10.3390/electronics12071619.
Full textSharafi, Javad, and Hassan Daghigh. "A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme." Journal of Mathematical Cryptology 16, no. 1 (January 1, 2022): 205–14. http://dx.doi.org/10.1515/jmc-2021-0013.
Full textLi, Quanrun, Chingfang Hsu, Debiao He, Kim-Kwang Raymond Choo, and Peng Gong. "An Identity-Based Blind Signature Scheme Using Lattice with Provable Security." Mathematical Problems in Engineering 2020 (May 11, 2020): 1–12. http://dx.doi.org/10.1155/2020/7528571.
Full textPreethi, Thakkalapally, and Bharat Amberker. "Traceable Signatures using Lattices." International Arab Journal of Information Technology 17, no. 6 (November 1, 2020): 965–75. http://dx.doi.org/10.34028/iajit/17/6/15.
Full textBranco, Pedro. "A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions." Advances in Mathematics of Communications 15, no. 1 (2021): 113–30. http://dx.doi.org/10.3934/amc.2020046.
Full textP. Ravindra, S. Vasu, V. Suresh, and K. Bangaru Lakshmi. "A Study on “Security of Cyber-Physical Systems in the Cloud”." Journal of Advanced Zoology 44, S-5 (November 15, 2023): 2347–64. http://dx.doi.org/10.17762/jaz.v44is-5.1854.
Full textLee, Hakjun. "A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain." Korean Institute of Smart Media 12, no. 2 (March 30, 2023): 76–82. http://dx.doi.org/10.30693/smj.2023.12.2.76.
Full textLai, Qiqi, Bo Yang, Zhe Xia, Yannan Li, Yuan Chen, and Zhenlong Li. "Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 589–606. http://dx.doi.org/10.1142/s0129054119400148.
Full textLi, Fengyin, Mengjiao Yang, Zhihao Song, Ping Wang, and Guoping Li. "Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice." Entropy 25, no. 8 (August 2, 2023): 1157. http://dx.doi.org/10.3390/e25081157.
Full textLi, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang, and Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes." Entropy 25, no. 8 (August 2, 2023): 1159. http://dx.doi.org/10.3390/e25081159.
Full textMuthukumaran V., Manimozhi I., Praveen Sundar P. V., Karthikeyan T., and Magesh Gopu. "Public Key Encryption With Equality Test for Industrial Internet of Things Based on Near-Ring." International Journal of e-Collaboration 17, no. 3 (July 2021): 25–45. http://dx.doi.org/10.4018/ijec.2021070102.
Full textYang, Qiang, and Daofeng Li. "Provably Secure Lattice-Based Self-Certified Signature Scheme." Security and Communication Networks 2021 (December 31, 2021): 1–9. http://dx.doi.org/10.1155/2021/2459628.
Full textFang, Wu Yan, Zheng Huang, Wang Li Cheng, and Wen Qiao Yan. "Enhanced Provably Secure NTRU Encryption Based on Hard Learning over Rings." Applied Mechanics and Materials 236-237 (November 2012): 1139–44. http://dx.doi.org/10.4028/www.scientific.net/amm.236-237.1139.
Full textHuixian, Li, Gao Jin, Wang Lingyun, and Pang Liaojun2. "MPKC-based Threshold Proxy Signcryption Scheme." International Arab Journal of Information Technology 17, no. 2 (February 28, 2019): 196–206. http://dx.doi.org/10.34028/iajit/17/2/7.
Full textEscribano Pablos, José Ignacio, María Isabel González Vasco, Misael Enrique Marriaga, and Ángel Luis Pérez del Pozo. "Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber." Mathematics 8, no. 10 (October 21, 2020): 1853. http://dx.doi.org/10.3390/math8101853.
Full textKaiyang, Guo, Han Yiliang, Wu Riming, and Liu Kai. "SACS-ABE&B: Supervised Access Control Scheme Based on Attribute-Based Encryption and Blockchain." Security and Communication Networks 2022 (September 23, 2022): 1–13. http://dx.doi.org/10.1155/2022/7067812.
Full textYang, Nan, and Youliang Tian. "Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE." Security and Communication Networks 2023 (January 3, 2023): 1–9. http://dx.doi.org/10.1155/2023/3765934.
Full textXie, Congge, Jian Weng, and Jinming Wen. "Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices." Security and Communication Networks 2020 (January 14, 2020): 1–11. http://dx.doi.org/10.1155/2020/1743421.
Full textAlagic, Gorjan, Stacey Jeffery, Maris Ozols, and Alexander Poremba. "On Quantum Chosen-Ciphertext Attacks and Learning with Errors." Cryptography 4, no. 1 (March 21, 2020): 10. http://dx.doi.org/10.3390/cryptography4010010.
Full textCao, Chengtang, Lin You, and Gengran Hu. "Fuzzy Identity-Based Ring Signature from Lattices." Security and Communication Networks 2021 (March 16, 2021): 1–9. http://dx.doi.org/10.1155/2021/6692608.
Full textKim, Gyu Chol, Hyon A. Ji, Yong Bok Jong, Gwang Hyok Kim, and Hak Su Kim. "Possibility of decryption speed-up by parallel processing in CCA secure hashed ElGamal." PLOS ONE 18, no. 11 (November 30, 2023): e0294840. http://dx.doi.org/10.1371/journal.pone.0294840.
Full textChen, Taowei, Zhixin Ren, Yimin Yu, Jie Zhu, and Jinyi Zhao. "Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain." Applied Sciences 13, no. 13 (June 30, 2023): 7765. http://dx.doi.org/10.3390/app13137765.
Full textThanalakshmi, P., N. Anbazhagan, Gyanendra Prasad Joshi, and Eunmok Yang. "A quantum resistant universal designated verifier signature proof." AIMS Mathematics 8, no. 8 (2023): 18234–50. http://dx.doi.org/10.3934/math.2023927.
Full textLee, Jaeheung, and Yongsu Park. "HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme." Applied Sciences 11, no. 16 (August 10, 2021): 7350. http://dx.doi.org/10.3390/app11167350.
Full textThanalakshmi, P., R. Anitha, N. Anbazhagan, Chulho Park, Gyanendra Prasad Joshi, and Changho Seo. "A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme." Mathematics 10, no. 10 (May 11, 2022): 1642. http://dx.doi.org/10.3390/math10101642.
Full textSeyhan, Kübra, Sedat Akleylek, and Ahmet Faruk Dursun. "Password authenticated key exchange-based on Kyber for mobile devices." PeerJ Computer Science 10 (March 29, 2024): e1960. http://dx.doi.org/10.7717/peerj-cs.1960.
Full textXie, Yi-Yang, Xiu-Bo Chen, and Yi-Xian Yang. "A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems." Security and Communication Networks 2022 (September 1, 2022): 1–12. http://dx.doi.org/10.1155/2022/4052029.
Full textJiang, Jian, Yulong Gao, Yufei Gong, and Zhengtao Jiang. "A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update." Sensors 24, no. 14 (July 11, 2024): 4493. http://dx.doi.org/10.3390/s24144493.
Full textGao, Wenhua, Li Yang, Daode Zhang, and Xia Liu. "Quantum Identity-Based Encryption from the Learning with Errors Problem." Cryptography 6, no. 1 (February 16, 2022): 9. http://dx.doi.org/10.3390/cryptography6010009.
Full textLiang, Junbin, Jianye Huang, Qiong Huang, Liantao Lan, and Man Ho Allen Au. "A Lattice-Based Certificateless Traceable Ring Signature Scheme." Information 14, no. 3 (March 2, 2023): 160. http://dx.doi.org/10.3390/info14030160.
Full textTang, Yongli, Feifei Xia, Qing Ye, Mengyao Wang, Ruijie Mu, and Xiaohang Zhang. "Identity-Based Linkable Ring Signature on NTRU Lattice." Security and Communication Networks 2021 (September 16, 2021): 1–17. http://dx.doi.org/10.1155/2021/9992414.
Full textWu, Faguo, Bo Zhou, and Xiao Zhang. "Identity-Based Proxy Signature with Message Recovery over NTRU Lattice." Entropy 25, no. 3 (March 4, 2023): 454. http://dx.doi.org/10.3390/e25030454.
Full textYang, Chunli, Shihui Zheng, Licheng Wang, Miaomiao Tian, Lize Gu, and Yixian Yang. "A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model." Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/391276.
Full textZhang, Lili, and Yanqin Ma. "A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model." Mathematical Problems in Engineering 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/307637.
Full textJIA, Xiao-Ying, Bao LI, and Ya-Min LIU. "Random Oracle Model." Journal of Software 23, no. 1 (March 5, 2012): 140–51. http://dx.doi.org/10.3724/sp.j.1001.2012.04092.
Full textRjaško, Michal. "On Pseudo-Random Oracles." Tatra Mountains Mathematical Publications 53, no. 1 (December 1, 2012): 155–87. http://dx.doi.org/10.2478/v10127-012-0045-5.
Full text