搜索结果: 1-8 共查到“军队指挥学 ID-based encryption”相关记录8条 . 查询时间(0.171 秒)
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
insider attacks chosen ciphertext attacks modification
2018/4/25
At ACISP 2017, Wu et al. presented an identity-based encryption with equality test (IBEET) that considers to prevent insider attacks. To analyze its security, they proposed a new security notion for I...
Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation
Identity-based Encryption Trapdoor DL Groups Discrete Logarithm Pre-computation
2012/3/28
The existing identity-based encryption (IBE) schemes based on pairings require pairing computations in encryption or decryption algorithm and it is a burden to each entity which has restricted computi...
An Anonymous ID-based Encryption Revisited
Anonymous ID-based encryption Smooth Transition
2010/2/20
In 2006, Boyen and Waters proposed an anonymous ID-based encryp-
tion. It is impressive that in the scheme the system secret key is a tuple of five
numbers. The user's secret key is also a tuple of ...
Practical ID-based Encryption for Wireless Sensor Network
Practical ID-based Encryption Wireless Sensor Network
2010/1/18
In this paper, we propose a new practical identity-based
encryption scheme which is suitable for wireless sensor network
(WSN). We call it Receiver-Bounded Online/Offline
Identity-based Encryption ...
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Certificateless Encryption ID-Based Encryption ID-Based Key Agreement
2009/12/29
We discuss the relationship between ID-based key agree-
ment protocols, certificateless encryption and ID-based key encapsula-
tion mechanisms. In particular we show how in some sense ID-based key
...
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
ID-Based Encryption Complex Hierarchies Forward Security Broadcast Encryption
2009/3/27
vA forward-secure encryption scheme protects secret keys from exposure by evolving the
keys with time. Forward security has several unique requirements in hierarchical identity-based
encryption (HIB...
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
ID-based encryption chosen ciphertext security gap bilinear Diffie-Hellman problem
2009/3/9
ID-based encryption allows for a sender to encrypt a message
to an identity without access to a public key certificate. Based on the
bilinear pairing, Boneh and Franklin proposed the first practical...
Efficient Hybrid Encryption from ID-Based Encryption
Hybrid Encryption Selective-ID KEM Threshold PKE Chameleon Hash
2008/9/18
This paper deals with generic transformations from ID-based key encapsulation mech-
anisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known
until now is by Boneh ...