搜索结果: 1-9 共查到“军队指挥学 certificate-based”相关记录9条 . 查询时间(0.078 秒)
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Proxy signature certificate-based message recovery
2016/1/26
In this paper, we propose the first provable secure certificate-based proxy signature with message
recovery without bilinear pairing. The notion of certificate-based cryptography was initially
intro...
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
authenticated key agreement certificated-based cryptography public key repalcement attack
2016/1/3
Certificate-based cryptography is a new public-key cryptographic paradigm that has very appealing features, namely it simplifies the certificate management problem in traditional public key cryptograp...
Certificate-Based Encryption Resilient to Key Leakage
certificate-based encryption master secret key leakage dual system encryption
2015/12/31
Certificate-based encryption (CBE) is an important class of public key encryption but the
existing schemes are secure only under the premise that the decryption key (or private key) and master
priva...
Certificate-Based Signcryption: Security Model and Efficient Construction
public-key cryptography / Certificate-based signcryption, Key replacement attack, Insider security, Security model, Chosen-ciphertext security, Existential unforgeability
2012/3/23
Signcryption is an important cryptographic primitive that simultaneously achieves confidentiality and authentication in an efficient manner. In 2008, Luo et al. introduced the notion of certificate-ba...
In this paper, we propose a short and efficient certificate-based signature (CBS) scheme. Certificate-based cryptography proposed by Gentry \cite{Gentry03} combines the merit of traditional public key...
Strongly Secure Certificate-Based Encryption Scheme with Low Communication Bandwidth
certificate-based encryption security model public key replacement attack random oracle model
2010/11/2
Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which was introduced to solve the certificate management problem in traditional public-key encryption (PKE). It combines PKE ...
Certificate-Based Signature Schemes without Pairings or Random Oracles
Certificate-Based Signature Schemes Pairings Random Oracles
2009/6/5
In this paper, we propose two new certificate-based signa-
ture (CBS) schemes with new features and advantages. The first one
is very ecient as it does not require any pairing computation and its
...
Certificate-Based Encryption and the Certificate Revocation Problem
Certificate-Based Encryption Certificate Revocation Problem
2009/4/10
We introduce the notion of certificate-based encryption. In
this model, a certificate – or, more generally, a signature – acts not only
as a certificate but also as a decryption key. To decrypt a me...
Certificate-Based Encryption Without Random Oracles
identity-based encryption certificate-based encryption selective-ID security
2008/10/20
We present a certificate-based encryption scheme which is fully secure in the standard model. Our
scheme is based on the identity-based encryption scheme of Waters [16]. Although some generic constru...