搜索结果: 76-90 共查到“军事学 Identity-Based Encryption”相关记录98条 . 查询时间(0.178 秒)
Security Notions for Identity Based Encryption
foundations, identity-based encryption one-wayness indistinguishability
2009/2/20
Identity Based Encryption (IBE) has attracted a lot of attention since the publica-
tion of the scheme by Boneh and Franklin. So far, only indistinguishability based security notions have been consid...
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Security Proof Sakai-Kasahara's Identity-Based Encryption Scheme
2009/2/18
Identity-based encryption (IBE) is a special asymmetric en-
cryption method where a public encryption key can be an arbitrary iden-
tifier and the corresponding private decryption key is created by ...
Boneh-Franklin Identity Based Encryption Revisited
provable security identity-based encryption exact security
2009/2/5
The first practical identity based encryption (IBE) scheme
was proposed by Boneh and Franklin in [BF03]. In this work we point
out that there is a flawed step in the security reduction exhibited by ...
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Hierarchical Identity Encryption Constant Size Ciphertext
2009/1/13
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext
consists of just three group elements and decryption requires only two bilinear map computations,regardless of t...
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
Efficient Chosen-Ciphertext Secure Identity-Based Encryption Wildcards
2008/12/25
We propose new instantiations of chosen-ciphertext secure identitybased
encryption schemes with wildcards (WIBE). Our schemes outperform
all existing alternatives in terms of efficiency as well as s...
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles
Practical Hierarchical Identity Encryption Signature schemes Random Oracles
2008/12/24
In this paper, we propose a Hierarchical Identity Based Encryption
scheme that is proven secure under the strongest model of [5]
directly, without relying on random oracles. The size of the cipherte...
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
hierarchical identity-based encryption adaptive attacks security against chosen ciphertext attacks
2008/12/24
The current work considers the problem of obtaining a hierarchical identity-based encryption (HIBE) protocol which is secure against adaptive key extraction and decryption queries. Such a protocol is ...
In this paper we introduce a new primitive called identity-based encryption with wildcards, or
WIBE for short. It allows to encrypt messages to a whole range of users simultaneously whose
identities...
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters
Identity Based Encryption Protocols Short Public Parameters
2008/12/12
At Eurocrypt 2005, Waters proposed an efficient identity based encryption (IBE) scheme. One drawback of this scheme is that the size of the public parameter is rather large. Our first contribution is ...
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters
Identity Encryption Protocols Short Public Parameters
2008/12/11
At Eurocrypt 2005, Waters proposed an efficient identity based encryption (IBE) scheme. One drawback of this scheme is that the size of the public parameter is rather large. Our first contribution is ...
Direct Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
Chosen-ciphertext security Identity-Based Encryption Bilinear Maps
2008/11/12
We describe a practical identity-based encryption scheme that is secure in the standard model
against chosen-ciphertext (IND-CCA2) attacks. Security is based on an assumption comparable to
(but slig...
We define key privacy for IBE systems in terms of two properties, in-
distinguishability under chosen identity attack, and indistinguishability
under chosen key generator attack. Further, we show th...
Anonymous Hierarchical Identity-Based Encryption(Without Random Oracles)
anonymous hierarchical identity-based encryption
2008/11/4
We present an identity-based cryptosystem that features fully anonymous ciphertexts and
hierarchical key delegation. We give a proof of security in the standard model, based on the mild
Decision Lin...
TinyTate: Identity-Based Encryption for Sensor Networks
identity-based encryption bilinear pairings key management sensor networks
2008/9/19
In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the advent of Identity-B...
In this paper we construct two new fuzzy identity-based encryption (IBE) schemes in
the random oracle model. Not only do our schemes provide public parameters whose size is
independent of the number...