Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms. To deal with those quantum attacks, lattice-based cryptography was introduced by Ajtai in 1996. To the best of our knowledge, the existing lattice-based authentication schemes are based on a lattice-based public key encryption called NTRU: a ring-based public key cryptosystem, proposed by Hoffstein, Pipher, and Silverman in 1998. However, these schemes only support the case of a single user. In view of the aforementioned issue, we propose the first lattice-based group authentication scheme. The proposed scheme is secur...
It is known that the development of quantum computers will break the cryptographic schemes that are...
It is known that the development of quantum computers will break the cryptographic schemes that are...
A password protected secret sharing (PPSS ) allows a user to store shares of a secret on a set of L ...
Authentication has been adopted in many areas, but most of these authentication schemes are built us...
Group communication enables Internet of Things (IoT) devices to communicate in an efficient and fast...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
Support of membership revocation is a desirable functionality for any group signature scheme. Among ...
Support of membership revocation is a desirable functionality for any group signature scheme. Among ...
Abstract. Support of membership revocation is a desirable functionality for any group signature sche...
Group encryption (GE), the encryption analog of group signatures, is a fundamental primitive that of...
Abstract. We introduce a lattice-based group signature scheme that provides several noticeable impro...
Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as on...
We introduce a lattice-based group signature scheme that provides several noticeable improvements ov...
Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as on...
The most challenging application of post-quantum cryptography (PQC) is the distribution of provably ...
It is known that the development of quantum computers will break the cryptographic schemes that are...
It is known that the development of quantum computers will break the cryptographic schemes that are...
A password protected secret sharing (PPSS ) allows a user to store shares of a secret on a set of L ...
Authentication has been adopted in many areas, but most of these authentication schemes are built us...
Group communication enables Internet of Things (IoT) devices to communicate in an efficient and fast...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
Support of membership revocation is a desirable functionality for any group signature scheme. Among ...
Support of membership revocation is a desirable functionality for any group signature scheme. Among ...
Abstract. Support of membership revocation is a desirable functionality for any group signature sche...
Group encryption (GE), the encryption analog of group signatures, is a fundamental primitive that of...
Abstract. We introduce a lattice-based group signature scheme that provides several noticeable impro...
Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as on...
We introduce a lattice-based group signature scheme that provides several noticeable improvements ov...
Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as on...
The most challenging application of post-quantum cryptography (PQC) is the distribution of provably ...
It is known that the development of quantum computers will break the cryptographic schemes that are...
It is known that the development of quantum computers will break the cryptographic schemes that are...
A password protected secret sharing (PPSS ) allows a user to store shares of a secret on a set of L ...