Back to Results
First PageMeta Content
Hidden Field Equations / Unbalanced Oil and Vinegar / Full Domain Hash / RSA / Digital signature / One-way function / Cryptography / Public-key cryptography / Post-quantum cryptography


MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog
Add to Reading List

Document Date: 2013-12-30 04:23:42


Open Document

File Size: 459,14 KB

Share Result on Facebook

Country

China / /

/

Facility

South China University of Technology / /

IndustryTerm

search attack / generation algorithm / proxy signature protocol / probabilistic algorithm / verification algorithm / exhaustive search algorithm needs / hybrid attack algorithm / oil variables / exhaustive search algorithm / multivariate systems / exhaustive search attack algorithm / exhaustive search attack / linear systems / oil subspace / /

Organization

Xiaoyu Li4 School of Computer Science & Engineering / South China University of Technology / Guangzhou / /

Person

Shaohua Tang / /

Position

Models Security model for signature / MP / Private / Corresponding author / Security model for proxy signature / /

Region

South China / /

Technology

so-called hybrid attack algorithm / cryptography / key generation algorithm / public key / inverting algorithm / exhaustive search algorithm / signing algorithm / verification algorithm / private key / secret key / exhaustive search attack algorithm / proxy signature protocol / key-generation algorithm / probabilistic algorithm / /

SocialTag