Efficient identification scheme in standard model based on bivariate function hard problem
The existence of zero knowledge in authentication and identification has become important in cryptography due to the usefulness in authenticating and identifying honesty of both the prover and verifier without relaying any private message in communication. Many identification schemes have been set u...
| Main Author: | Tea, Boon Chian |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/67648/ http://psasir.upm.edu.my/id/eprint/67648/1/IPM%202015%2021%20IR.pdf |
Similar Items
On the diophantine equation p ͯ +qᵐnᵞ = z²
by: Bakar, Halimatun Saadiah
Published: (2018)
by: Bakar, Halimatun Saadiah
Published: (2018)
Kaedah Penyelesaian Integer kepada Persamaan Diofantus x³ⁿ + y³ⁿ = kz²ⁿ
by: Zahari, Nor Mazlin
Published: (2011)
by: Zahari, Nor Mazlin
Published: (2011)
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014)
by: Tea, Boon Chian, et al.
Published: (2014)
Solution of diophantine equation x⁴ + y⁴= pᵏz³ for primes 2 ≤ p ≤ 13.
by: Ismail, Shahrina
Published: (2011)
by: Ismail, Shahrina
Published: (2011)
An efficient identification scheme based on Bivariate function hard problem
by: Boon, Chian Tea, et al.
Published: (2022)
by: Boon, Chian Tea, et al.
Published: (2022)
On the diophantine equation x²+2ª .zb= y³n
by: Amalul Hair, Nur Hidayah
Published: (2020)
by: Amalul Hair, Nur Hidayah
Published: (2020)
An efficient identification scheme in standard model based on the diophantine equation hard problem
by: Tea, Boon Chian, et al.
Published: (2013)
by: Tea, Boon Chian, et al.
Published: (2013)
Some solutions of diophantine equation x3+y3=pk z3
by: See, Kok Leong
Published: (2011)
by: See, Kok Leong
Published: (2011)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
General relation between sums of figurate numbers
by: Mohamat Johari, Mohamat Aidil
Published: (2013)
by: Mohamat Johari, Mohamat Aidil
Published: (2013)
A new approach to generate all Pythagorean triples
by: Overmars, A., et al.
Published: (2019)
by: Overmars, A., et al.
Published: (2019)
A Generalization of the Bernoulli Numbers
by: Bahari, Hasmiah
Published: (2006)
by: Bahari, Hasmiah
Published: (2006)
Extending jochemsz-may analytical strategies upon integer factorization problem
by: Adenan, Nurul Nur Hanisah
Published: (2021)
by: Adenan, Nurul Nur Hanisah
Published: (2021)
Two-level compact implicit schemes for three-dimensional parabolic problems.
by: Karaa, Samir, et al.
Published: (2009)
by: Karaa, Samir, et al.
Published: (2009)
Beberapa Penggunaan Teori Nombor dalam Kriptografi
by: Yunos, Faridah
Published: (2001)
by: Yunos, Faridah
Published: (2001)
Parameterization of nice polynomials
by: Anton, Hozjee
Published: (2018)
by: Anton, Hozjee
Published: (2018)
Numerical solution of special second order initial value problems by hybrid type methods
by: Dauda Yusuf Jikantoro,
Published: (2014)
by: Dauda Yusuf Jikantoro,
Published: (2014)
Multi-base number representation in application to scalar multiplication and pairing computation
by: Mohammed Ismail, Abdelwahed
Published: (2011)
by: Mohammed Ismail, Abdelwahed
Published: (2011)
Existence of solution to first-order multipoint boundary value problems / Diana Sirmayunie Mohd Nasir
by: Mohd Nasir, Diana Sirmayunie
Published: (2010)
by: Mohd Nasir, Diana Sirmayunie
Published: (2010)
A new scheme for solving goursat problem using newton-cotes integration formula / Ros Fadilah Deraman
by: Deraman, Ros Fadilah
Published: (2014)
by: Deraman, Ros Fadilah
Published: (2014)
An efficient and provable secure identity-based identification scheme in the standard model
by: Ji-Jian, Chin, et al.
Published: (2008)
by: Ji-Jian, Chin, et al.
Published: (2008)
Nonparametric predictive inference with copulas for bivariate data
by: Noryanti, Muhammad, et al.
Published: (2023)
by: Noryanti, Muhammad, et al.
Published: (2023)
Predictive Inference for Bivariate Data with Nonparametric Copula
by: Noryanti, Muhammad, et al.
Published: (2016)
by: Noryanti, Muhammad, et al.
Published: (2016)
Interaction between inclined and curved cracks problems in plane elasticity
by: Aridi, Mohd Radzi
Published: (2014)
by: Aridi, Mohd Radzi
Published: (2014)
Weighted in time energy estimates for parabolic equations with applications to non-linear and non-local problems
by: Dokuchaev, Nikolai
Published: (2012)
by: Dokuchaev, Nikolai
Published: (2012)
Spline approach to the solution of Sturm - Liouville problem
by: S., Mehrkanoon, et al.
Published: (2009)
by: S., Mehrkanoon, et al.
Published: (2009)
Trigonometrically fitted multistep methods for solving oscillatory problems
by: Mansor, Aini Fadhlina
Published: (2017)
by: Mansor, Aini Fadhlina
Published: (2017)
Block backward differentiation alpha-formulas for solving stiff ordinary differential equations
by: Mohd Zawawi, Iskandar Shah
Published: (2017)
by: Mohd Zawawi, Iskandar Shah
Published: (2017)
Satu kaedah menentukan anggaran kekardinalan set penyelesaian sistem persamaan kongruen
by: Mohd Atan, Kamel Ariffin
Published: (1988)
by: Mohd Atan, Kamel Ariffin
Published: (1988)
Type-2 fuzzy linear systems
by: Najariyan, Marzieh, et al.
Published: (2017)
by: Najariyan, Marzieh, et al.
Published: (2017)
One-dimension high-order compact method for solving euler's equation
by: Mohamad, Mahmod Abd Hakim bin
Published: (2010)
by: Mohamad, Mahmod Abd Hakim bin
Published: (2010)
Measurement of different obstacles effect on rectangular cavity in low Reynolds number flow field using particle image velocimetry
by: Zahari @ Annuar, Ahsan Nur Mubarak
Published: (2013)
by: Zahari @ Annuar, Ahsan Nur Mubarak
Published: (2013)
Pricing warrant by using binomial model: comparison between historical and implied volatility / Khairu Azlan Abd Aziz … [et al.]
by: Abd Aziz, Khairu Azlan, et al.
Published: (2020)
by: Abd Aziz, Khairu Azlan, et al.
Published: (2020)
Principles and applications of algorithmic problem solving
by: Ferreira, Joao Fernando Peixoto
Published: (2011)
by: Ferreira, Joao Fernando Peixoto
Published: (2011)
Personal identification by Keystroke Pattern for login security
by: Abdullah, Norhayati
Published: (2001)
by: Abdullah, Norhayati
Published: (2001)
Modifications of parameter regula falsi method p-RF for inclusion of zero of a function with one real variable
by: Abu Bakar, Norhaliza
Published: (2012)
by: Abu Bakar, Norhaliza
Published: (2012)
Investigations into Local Class Field Theory with General Residue Fields
by: Hall, Christopher Stephen
Published: (2023)
by: Hall, Christopher Stephen
Published: (2023)
Hypersingular integral equations for triple Griffith cracks problems in an elastic half-plane
by: Husin, Nur Hazirah
Published: (2020)
by: Husin, Nur Hazirah
Published: (2020)
Similar Items
-
On the diophantine equation p ͯ +qᵐnᵞ = z²
by: Bakar, Halimatun Saadiah
Published: (2018) -
Kaedah Penyelesaian Integer kepada Persamaan Diofantus x³ⁿ + y³ⁿ = kz²ⁿ
by: Zahari, Nor Mazlin
Published: (2011) -
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014) -
Solution of diophantine equation x⁴ + y⁴= pᵏz³ for primes 2 ≤ p ≤ 13.
by: Ismail, Shahrina
Published: (2011) -
An efficient identification scheme based on Bivariate function hard problem
by: Boon, Chian Tea, et al.
Published: (2022)