-
1
Another look at non-standard discrete log and Diffie-Hellman problems
Published 2008-12-01Subjects: Get full text
Article -
2
A new CCA-secure encryption based on the Gap Hashed Diffie-Hellman problem
Published 2013Get full text
Article -
3
Improved lower bound for Diffie–Hellman problem using multiplicative group of a finite field as auxiliary group
Published 2018-06-01Subjects: “…lower bound for the diffie–hellman problem…”
Get full text
Article -
4
Triple receiver public key encryption cryptosystem
Published 2020-12-01Subjects: Get full text
Article -
5
Password Authenticated Key Exchange and Protected Password Change Protocols
Published 2017-07-01Subjects: Get full text
Article -
6
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability
Published 2022-06-01Subjects: Get full text
Article -
7
Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme
Published 2021-10-01Subjects: “…certificateless signature|bilinear pairings|security analysis|elliptic curve discrete diffie-hellman problem|random oracle model…”
Get full text
Article -
8
A Security-Mediated Encryption Scheme Based on ElGamal Variant
Published 2021-10-01Subjects: “…computational diffie-hellman problem…”
Get full text
Article -
9
Publicly Verifiable Multi-stage Secret Sharing on General Access Structures
Published 2023-05-01Subjects: “…monotone span program (msp); multi-stage secret sharing; bilinear pairing; computational diffie-hellman and decisional bilinear diffie-hellman problems; provably secure…”
Get full text
Article -
10
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01“…In particular, the authors give an effective and simple construction of RIB‐ME in the standard model, whose security is reduced to the hardness of decisional bilinear Diffie—Hellman problem and computational Diffie—Hellman problem. …”
Get full text
Article -
11
A lightweight attribute-based signcryption scheme based on cloud-fog assisted in smart healthcare.
Published 2024-01-01“…Security analysis confirms that the proposed scheme achieves indistinguishability under chosen ciphertext attack and existential unforgeability under chosen message attack if the computational bilinear Diffie-Hellman problem and the decisional bilinear Diffie-Hellman problem holds. …”
Get full text
Article -
12
An efficient identification protocol secure against concurrent-reset attacks
Published 2009-12-01“…Then we propose an extremely simple identification protocol and prove that its CR2 security is equivalent to the hardness of the Strong Diffie–Hellman problem.…”
Get full text
Article -
13
A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model
Published 2015-10-01“…In particular, the BU-RSH scheme is provably secure in the standard model by assuming the intractability of the `-hidden strong Diffie-Hellman problem and the subgroup decision problem.…”
Get full text
Article -
14
Privacy Protection for Telecare Medicine Information Systems with Multiple Servers Using a Biometric-based Authenticated Key Agreement Scheme
Published 2019-01-01“…The security of the proposed scheme is based on the elliptic curve decisional Diffie-Hellman problem assumption and hash function assumption. …”
Get full text
Article -
15
An improved lightweight certificateless generalized signcryption scheme for mobile-health system
Published 2019-01-01“…The confidentiality of our improved scheme can be reduced to the computational Diffie–Hellman problem, and the unforgeability, the Elliptic Curve Discrete Logarithm problem. …”
Get full text
Article -
16
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things
Published 2022-10-01“…Based on the elliptic curve Diffie–Hellman problem, we present a protocol achieving desirable forward and backward secrecy. …”
Get full text
Article -
17
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.
Published 2017-01-01“…The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. …”
Get full text
Article -
18
MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles
Published 2018-01-01“…Additionally, MDBV is proved to be secure in the random oracle model assuming the intractability of the computational Diffie-Hellman problem. In consideration of the network survivability and performance, the proposed MDBV can decrease the computation overhead and is more suitable for IoV.…”
Get full text
Article -
19
Dynamic multi-keyword searchable encryption scheme
Published 2023-04-01“…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
Get full text
Article -
20
Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
Published 2022-12-01“…Recently, a two-factor authentication scheme using hard problems in elliptic curve cryptography (ECC)—the elliptic curve discrete logarithm problem (ECDLP), elliptic curve computational Diffie–Hellman problem (ECCDHP), and elliptic curve factorization problem (ECFP)—was developed, but was unable to address several infeasibility issues while incurring high communication costs. …”
Get full text
Article