An Application of <i>p</i>-Fibonacci Error-Correcting Codes to Cryptography
In addition to their usefulness in proving one’s identity electronically, identification protocols based on zero-knowledge proofs allow designing secure cryptographic signature schemes by means of the Fiat–Shamir transform or other similar constructs. This approach has been followed by many cryptogr...
Main Authors: | Emanuele Bellini, Chiara Marcolla, Nadir Murru |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-04-01
|
Series: | Mathematics |
Subjects: | |
Online Access: | https://www.mdpi.com/2227-7390/9/7/789 |
Similar Items
-
DiLizium: A Two-Party Lattice-Based Signature Scheme
by: Jelizaveta Vakarjuk, et al.
Published: (2021-07-01) -
A Novel Authenticity of an Image Using Visual Cryptography
by: Koshta, Prashant Kumar, et al.
Published: (2012) -
SoK of Used Cryptography in Blockchain
by: Mayank Raikwar, et al.
Published: (2019-01-01) -
The Unexpected Fractal Signatures in Fibonacci Chains
by: Fang Fang, et al.
Published: (2019-11-01) -
Cryptography in privacy-preserving applications.
Published: (2005)