搜索结果: 1-6 共查到“军队指挥学 certificateless encryption”相关记录6条 . 查询时间(0.078 秒)
CCA2 Secure Certificateless Encryption Schemes Based on RSA
Certificateless encryption Adaptive Chosen Ciphertext Secure (CCA2) RSA Assumption Random Oracle model
2010/9/1
Certificateless cryptography, introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystem. In this paper, we present two novel and completely differe...
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Certificateless Encryption ID-Based Encryption ID-Based Key Agreement
2009/12/29
We discuss the relationship between ID-based key agree-
ment protocols, certificateless encryption and ID-based key encapsula-
tion mechanisms. In particular we show how in some sense ID-based key
...
General Certificateless Encryption and Timed-Release Encryption
security-mediated certificateless encryption timed-release encryption standard model
2009/6/2
While recent timed-release encryption (TRE) schemes are
implicitly supported by a certificateless encryption (CLE) mechanism,
the security models of CLE and TRE dier and there is no generic
transf...
A Survey of Certificateless Encryption Schemes and Security Models
Certificateless Encryption Schemes Security Models
2008/12/1
This paper surveys the literature on certificateless
encryption schemes. In particular, we examine the large
number of security models that have been proposed to prove
the security of certificatele...
Generic Certificateless Encryption in the Standard Model
Generic Certificateless Encryption Standard Model
2008/9/9
Despite the large number of certificateless encryption schemes recently proposed, many of them have been found to be insecure under a practical attack called malicious-but-passive KGC attack, since th...
Certificateless Encryption Schemes Strongly Secure in the Standard Model
certificateless encryption standard model strong security
2008/9/5
This paper presents the first constructions for certificateless
encryption (CLE) schemes that are provably secure against strong ad-
versaries in the standard model. It includes both a generic const...