More Efficient Digital Signatures with Tight Multi-user Security

被引:0
|
作者
Diemert, Denis [1 ]
Gellert, Kai [1 ]
Jager, Tibor [1 ]
Lyu, Lin [1 ]
机构
[1] Bergische Universität Wuppertal, Wuppertal, Germany
关键词
723 Computer Software; Data Handling and Applications - 723.5 Computer Applications - 913.1 Production Engineering;
D O I
暂无
中图分类号
学科分类号
摘要
Efficiency
引用
收藏
页码:1 / 31
相关论文
共 50 条
  • [41] A Sponge-Based PRF with Good Multi-user Security
    Bhattacharjee, Arghya
    Bhaumik, Ritam
    Nandi, Mridul
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 459 - 478
  • [42] On Multi-user Security of Schnorr Signature in Algebraic Group Model
    Fukumitsu, Masayuki
    Hasegawa, Shingo
    2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS, CANDARW, 2022, : 295 - 301
  • [43] Efficient multi-user MIMO downlink precoding and scheduling
    Haardt, M
    Stankovic, V
    Del Galdo, G
    IEEE CAMSAP 2005: FIRST INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING, 2005, : 237 - 240
  • [44] Multi-User Efficient Ergodic Loading for OFDMA Systems
    Krongold, Brian S.
    He, Yuan Yuan
    2009 IEEE 70TH VEHICULAR TECHNOLOGY CONFERENCE FALL, VOLS 1-4, 2009, : 520 - 524
  • [45] On Optimal Energy-Efficient Multi-User MIMO
    Miao, Guowang
    Zhang, Jianzhong
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [46] Plumb: Efficient stream processing of multi-user pipelines
    Qadeer, Abdul
    Heidemann, John
    SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (02): : 385 - 408
  • [47] MUSES: Efficient Multi-User Searchable Encrypted Database
    Le, Tung
    Behnia, Rouzbeh
    Guaardo, Jorge
    Hoang, Tang
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 2581 - 2598
  • [48] Energy-Efficient Uplink Multi-User MIMO
    Miao, Guowang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (05) : 2302 - 2313
  • [49] Dynamic security for multi-user access control in distributed environment
    Prakash, S. Jaya
    Kumar, K. Varada Raj
    Nedunuri, Deepak
    INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [50] Multi-user BBB security of public permutations based MAC
    Chen, Yu Long
    Dutta, Avijit
    Nandi, Mridul
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (05): : 1145 - 1177