An identification scheme based on bivariate function hard problem
Recently, an identification scheme based on Diophantine Equation Hard Problem is proposed. The scheme was proven secure against impersonation under passive attack, assuming that solving Diophantine Equation Hard Problem is hard. However, further simulation showed that there exists non-negligible pro...
| Main Authors: | Tea, Boon Chian, Kamel Ariffin, Muhammad Rezal |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Institute for Mathematical Research, Universiti Putra Malaysia
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/66480/ http://psasir.upm.edu.my/id/eprint/66480/1/Cryptology2014-1.pdf |
Similar Items
An efficient identification scheme based on Bivariate function hard problem
by: Boon, Chian Tea, et al.
Published: (2022)
by: Boon, Chian Tea, et al.
Published: (2022)
Efficient identification scheme in standard model based on bivariate function hard problem
by: Tea, Boon Chian
Published: (2014)
by: Tea, Boon Chian
Published: (2014)
An efficient identification scheme in standard model based on the diophantine equation hard problem
by: Tea, Boon Chian, et al.
Published: (2013)
by: Tea, Boon Chian, et al.
Published: (2013)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
The diophantine equation hard problem (DEHP) as an asymmetric primitive - is it possible?
by: Kamel Ariffin, Muhammad Rezal
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal
Published: (2013)
A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem
by: Yusof, Siti Nabilah, et al.
Published: (2024)
by: Yusof, Siti Nabilah, et al.
Published: (2024)
On the underlying hard lattice problems of GGH encryption scheme
by: Mandangan, Arif, et al.
Published: (2018)
by: Mandangan, Arif, et al.
Published: (2018)
Design optimization for the two-stage bivariate pattern recognition scheme
by: Mokhtar, Mohd Shukri
Published: (2015)
by: Mokhtar, Mohd Shukri
Published: (2015)
Rank AGS identification scheme and signature scheme
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
Bivariate quality control using two-stage intelligent monitoring scheme
by: Masood, Ibrahim, et al.
Published: (2014)
by: Masood, Ibrahim, et al.
Published: (2014)
Diagnosis of bivariate process variation using an integrated mspc-ann scheme
by: Masood, Ibrahim, et al.
Published: (2016)
by: Masood, Ibrahim, et al.
Published: (2016)
A new arbitrated signing scheme based on BFHP
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
A new arbitrated signing scheme based on BFHP
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2015)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2015)
A scheme for balanced monitoring and accurate diagnosis of bivariate process mean shifts
by: Masood, Ibrahim
Published: (2012)
by: Masood, Ibrahim
Published: (2012)
An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme.
by: Ariffin, Suriyani, et al.
Published: (2012)
by: Ariffin, Suriyani, et al.
Published: (2012)
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016)
by: Mahad, Zahari, et al.
Published: (2016)
Identification of shift variation in bivariate process using pattern recognition technique
by: Mohd Haizan, Mohamad Azrul Azhad
Published: (2019)
by: Mohd Haizan, Mohamad Azrul Azhad
Published: (2019)
Modification of Pickands' dependence function for ordered bivariate extreme distribution.
by: Adam, Mohd. Bakri, et al.
Published: (2011)
by: Adam, Mohd. Bakri, et al.
Published: (2011)
The Mellin Transform of Generalized Functions and Some Applications
by: Kamel Ariffin, Muhammad Rezal
Published: (2002)
by: Kamel Ariffin, Muhammad Rezal
Published: (2002)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
A new CCA-secure encryption based on the Gap Hashed Diffie-Hellman problem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
Predictive inference with copulas for bivariate data
by: Noryanti, Muhammad
Published: (2016)
by: Noryanti, Muhammad
Published: (2016)
AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem
by: Mahad, Zahari, et al.
Published: (2012)
by: Mahad, Zahari, et al.
Published: (2012)
An estimator for the new bivariate copula
by: Mah, Pauline Jin Wee, et al.
Published: (2016)
by: Mah, Pauline Jin Wee, et al.
Published: (2016)
Study of artificial neural network scheme application in manufacturing industry for monitoring-diagnosis bivariate process variation
by: Majid, Mariam
Published: (2014)
by: Majid, Mariam
Published: (2014)
Nonparametric predictive inference with copulas for bivariate data
by: Noryanti, Muhammad, et al.
Published: (2023)
by: Noryanti, Muhammad, et al.
Published: (2023)
Predictive Inference for Bivariate Data with Nonparametric Copula
by: Noryanti, Muhammad, et al.
Published: (2016)
by: Noryanti, Muhammad, et al.
Published: (2016)
Novel bivariate moment-closure approximations
by: Krishnarajah, Isthrinayagy, et al.
Published: (2007)
by: Krishnarajah, Isthrinayagy, et al.
Published: (2007)
Bayesian inference for the bivariate extreme model
by: Mohd Amin, Nor Azrita, et al.
Published: (2016)
by: Mohd Amin, Nor Azrita, et al.
Published: (2016)
On robust bivariate and multivariate correlation coefficient
by: Uraibi, Hassan Sami, et al.
Published: (2019)
by: Uraibi, Hassan Sami, et al.
Published: (2019)
Construction of a new bivariate copula based on Ruschendorf method
by: Jin, Pauline Wee Mah, et al.
Published: (2014)
by: Jin, Pauline Wee Mah, et al.
Published: (2014)
Synchronization and a secure communication scheme using optical star network
by: Theesar, S. Jeeva Sathya, et al.
Published: (2013)
by: Theesar, S. Jeeva Sathya, et al.
Published: (2013)
Novel forgery mechanisms in multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2014)
by: Mahad, Zahari, et al.
Published: (2014)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2015)
by: Mahad, Zahari, et al.
Published: (2015)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
Bivariate association analysis of longitudinal phenotypes in families.
by: Melton, Phillip
Published: (2014)
by: Melton, Phillip
Published: (2014)
Similar Items
-
An efficient identification scheme based on Bivariate function hard problem
by: Boon, Chian Tea, et al.
Published: (2022) -
Efficient identification scheme in standard model based on bivariate function hard problem
by: Tea, Boon Chian
Published: (2014) -
An efficient identification scheme in standard model based on the diophantine equation hard problem
by: Tea, Boon Chian, et al.
Published: (2013) -
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014) -
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)