Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiations as important primitive operations. To expand the applicability of these solutions to computationally weaker devices, it has been advocated that a computationally weaker client (i.e., capable of perf...
Main Authors: | Crescenzo Giovanni Di, Khodjaeva Matluba, Kahrobaei Delaram, Shpilrain Vladimir |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2020-10-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2019-0036 |
Similar Items
-
Quasi-subfield Polynomials and the Elliptic Curve Discrete Logarithm Problem
by: Huang Ming-Deh, et al.
Published: (2020-06-01) -
Secure Delegation-Based Authentication for Telecare Medicine Information Systems
by: Zuowen Tan
Published: (2018-01-01) -
Recovering Secrets From Prefix-Dependent Leakage
by: Ferradi Houda, et al.
Published: (2020-06-01) -
Designing Efficient Dyadic Operations for Cryptographic Applications
by: Banegas Gustavo, et al.
Published: (2020-06-01) -
New lattice attacks on DSA schemes
by: Poulakis Dimitrios
Published: (2016-06-01)