搜索结果: 1-15 共查到“军事学 Subgroups”相关记录15条 . 查询时间(0.171 秒)
Group-homomorphic Secret Sharing Schemes Are Group-characterizable with Normal Subgroups
homomorphic secret sharing schemes group-characterizable distribution quasi-uniform distribution
2019/5/29
A group-characterizable random variable [Chan and Yeung 2002] is induced by a joint distribution on the (left) cosets of some subgroups of a main group. A homomorphic secret sharing scheme [Benaloh 19...
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons
RSA homomorphic encryption homomorphic threshold
2018/3/5
In contrast to related work which encrypts and acts on each bit of the input separately, our protocol compares multiple input bits simultaneously within a single ciphertext. Compared to the related pr...
Parameterization of Edwards curves on the rational field Q with given torsion subgroups
Edwards curve twisted Edwards curve torsion subgroups
2018/1/29
This paper presents the basic concepts of the Edwards curves, twisted Edwards curves and the point addition laws on these curves. The main result is the parameterization of the Edward curve with the g...
A Certain Family of Subgroups of Zn⋆ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption
families of computational groups weak pseudo-freeness abelian groups
2017/11/28
A Certain Family of Subgroups of Zn⋆ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption.
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"
attack trapdoor subgroup congruential equations
2016/5/30
In this short report we analyse the security of three schemes proposed by J. H. Park et al. in "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups". The schemes make ...
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups
identity-based encryption trapdoor subgroup RSA modulus
2016/5/24
We present a new Identity-Based Encryption (IBE) scheme from a trapdoor subgroup of Z∗n for an RSA modulus n. In a trapdoor subgroup of Z∗n, a subgroup order is hidden and can be used as a...
Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups
word problem subgroup membership problem Mihailova subgroup
2016/1/8
A presentation of a group with two generators having unsolvable word problem and an
explicit countable presentation of Mihailova subgroup of F2 × F2 with finite number of generators are
given. Where...
Squaring in cyclotomic subgroups
Cyclotomic subgroups squaring pairing-based cryptography
2010/10/26
We propose new squaring formulae for cyclotomic subgroups of certain finite fields. Our formulae use a compressed representation of elements having the property that decompression can be performed at ...
FACTOR-4 AND 6 COMPRESSION OF CYCLOTOMIC SUBGROUPS OF F24m AND F36m
Finite field compression cyclotomic subgroups pairing-based cryptography
2009/7/1
Bilinear pairings derived from supersingular elliptic curves of embedding
degrees 4 and 6 over finite fields F2m and F3m, respectively, have
been used to implement pairing-based cryptographic protoc...
NON-CYCLIC SUBGROUPS OF JACOBIANS OF GENUS TWO CURVES
Jacobians hyperelliptic genus two curves pairings
2009/6/2
Let E be an elliptic curve dened over a nite eld. Balasubramanian
and Koblitz have proved that if the `th roots of unity ` is not contained
in the ground eld, then a eld extension of the groun...
NON-CYCLIC SUBGROUPS OF JACOBIANS OF GENUS TWO CURVES WITH COMPLEX MULTIPLICATION
Jacobians hyperelliptic curves embedding degree complex multiplication
2009/6/2
Let E be an elliptic curve dened over a nite eld. Balasubramanian
and Koblitz have proved that if the `th roots of unity ` is not contained
in the ground eld, then a eld extension of the groun...
Hidden Number Problem in Small Subgroups
Hidden number problem Diffie-Hellman key exchange Lattice reduction
2009/4/8
Boneh and Venkatesan have proposed a polynomial time algorithm
for recovering a "hidden" element ® 2 IFp, where p is prime, from
rather short strings of the most significant bits of the residue ...
This paper gives a survey of some ways to improve the efficiency
of discrete log-based cryptography by using the restriction of
scalars and the geometry and arithmetic of algebraic tori and abelian
...
PRIME ORDER PRIMITIVE SUBGROUPS IN TORUS-BASED CRYPTOGRAPHY
finite field primitive subgroup torus-based cryptography
2009/1/7
We use the Bateman-Horn conjecture to study the order of the set
of Fq-rational points of primitive subgroups that arise in torus-based cryptog-
raphy. We provide computational evidence to support ...
Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves
Jacobians hyperelliptic curves complex multiplication cryptography
2008/9/9
In this paper we obtain conditions on the divisors of the group
order of the Jacobian of a hyperelliptic genus 2 curve, generated by the complex
multiplication method described by Weng (2003) and Ga...