Generic transformations for existentially unforgeable signature schemes in the bounded leakage model

2016 ◽  
Vol 9 (12) ◽  
pp. 1829-1842 ◽  
Author(s):  
Yuyu Wang ◽  
Keisuke Tanaka
2020 ◽  
Vol 4 ◽  
pp. 75-82
Author(s):  
D.Yu. Guryanov ◽  
◽  
D.N. Moldovyan ◽  
A. A. Moldovyan ◽  

For the construction of post-quantum digital signature schemes that satisfy the strengthened criterion of resistance to quantum attacks, an algebraic carrier is proposed that allows one to define a hidden commutative group with two-dimensional cyclicity. Formulas are obtained that describe the set of elements that are permutable with a given fixed element. A post-quantum signature scheme based on the considered finite non-commutative associative algebra is described.


Author(s):  
Dibo Pan ◽  
Haijun Xu ◽  
Bolong Liu ◽  
Congnan Yang

The sealing characteristics of an annular power cylinder based on the Twin-rotor piston engine are studied, which provides a theoretical foundation for the sealing design of a new high-power density piston engine. In this paper, the basis thermodynamic realization process of an annular power cylinder is presented. The Runge Kutta equation is used to establish the coupled leakage model of adjacent working chambers under annular piston seal. And the sealing performance of the annular power cylinder is analyzed in detail. Moreover, the influence of rotor speed and compression ratio on the sealing characteristics and leakage is studied. Finally, some tests are carried out to verify the sealing principle and simulation results, which verifies the theoretical basis of simulation analysis. Results show that there are double pressure peaks in the leakage chamber between two working chambers, which is beneficial to reduce the leakage rate. Besides, increasing the speed and decreasing the compression ratio can help to reduce gas leakage. Furthermore, the effects of speed variation on the leakage are only significant when rotating at low speed. Changing the compression ratio has a greater effect on the slope of the leakage curve at a low compression ratio, and the lower the compression ratio, the better the sealing effect.


2020 ◽  
Vol 14 (1) ◽  
pp. 339-345
Author(s):  
Taechan Kim ◽  
Mehdi Tibouchi

AbstractIn a recent paper devoted to fault analysis of elliptic curve-based signature schemes, Takahashi et al. (TCHES 2018) described several attacks, one of which assumed an equidistribution property that can be informally stated as follows: given an elliptic curve E over 𝔽q in Weierstrass form and a large subgroup H ⊂ E(𝔽q) generated by G(xG, yG), the points in E(𝔽q) whose x-coordinates are obtained from xG by randomly flipping a fixed, sufficiently long substring of bits (and rejecting cases when the resulting value does not correspond to a point in E(𝔽q)) are close to uniformly distributed among the cosets modulo H. The goal of this note is to formally state, prove and quantify (a variant of) that property, and in particular establish sufficient bounds on the size of the subgroup and on the length of the substring of bits for it to hold. The proof relies on bounds for character sums on elliptic curves established by Kohel and Shparlinski (ANTS–IV).


Mathematics ◽  
2021 ◽  
Vol 9 (7) ◽  
pp. 789
Author(s):  
Emanuele Bellini ◽  
Chiara Marcolla ◽  
Nadir Murru

In addition to their usefulness in proving one’s identity electronically, identification protocols based on zero-knowledge proofs allow designing secure cryptographic signature schemes by means of the Fiat–Shamir transform or other similar constructs. This approach has been followed by many cryptographers during the NIST (National Institute of Standards and Technology) standardization process for quantum-resistant signature schemes. NIST candidates include solutions in different settings, such as lattices and multivariate and multiparty computation. While error-correcting codes may also be used, they do not provide very practical parameters, with a few exceptions. In this manuscript, we explored the possibility of using the error-correcting codes proposed by Stakhov in 2006 to design an identification protocol based on zero-knowledge proofs. We showed that this type of code offers a valid alternative in the error-correcting code setting to build such protocols and, consequently, quantum-resistant signature schemes.


Sign in / Sign up

Export Citation Format

Share Document