The comprehensive study of provable security reveals that our scheme provides correctness, forward security and is immune to forging attacks.
People also ask
What is post-quantum identity based encryption?
What are the four types of post-quantum encryption algorithms?
Is RSA post-quantum secure?
What is an identity-based signature?
Jul 19, 2022 · The practical deployment of IBS in surveillance systems raises subtle security issues that should be addressed. To resolve these problems, we ...
A PQ-IDS scheme is proposed based on lattice assumption, and it inserts the IoT device's identity into the signature scheme to achieve the traceability of IoT ...
Security shows that the proposed scheme assures security against quantum attacks and satisfies the correctness, blindness, and unforgeability. In addition, we ...
Post-quantum secure identity-based signature achieving forward secrecy. https://doi.org/10.1016/j.jisa.2022.103275. Journal: Journal of Information Security ...
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms
May 14, 2022 · FROG can achieve highly computational efficient signatures with sub-linear key/signature sizes and (practically) unbounded signing capability.
Missing: identity- | Show results with:identity-
An identity-based signature (IBS) allows users to directly generate public keys from their identities, such as email addresses or usernames, without the need ...
Mar 1, 2021 · A ring-based signature scheme named Dilithium is the most efficient one and a candidate in the third round of the National Institute of Standards and ...
In this paper, we develop an identity based encryption (IBE) scheme, namely MU-IBE that achieves post-quantum security. Our scheme relies on multivariate ...
Missing: forward | Show results with:forward