搜索结果: 121-131 共查到“军队指挥学 Public Key Encryption”相关记录131条 . 查询时间(0.223 秒)
Public Key Encryption with Keyword Search Revisited
KPublic Key Encryption with Keyword Search Removing Secure Channel Refreshing Keywords
2009/2/13
The public key encryption with keyword search (PEKS) scheme recently proposed by
Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords
without compromising the securi...
Efficient Certificateless Public Key Encryption
Public Key Encryption efficient scheme authenticated encryption
2009/1/13
In [3] Al-Riyami and Paterson introduced the notion of "Cer-
tificateless Public Key Cryptography" and presented an instantiation.
In this paper, we revisit the formulation of certificateless publi...
Public Key Encryption with Keyword Search based on K-Resilient IBE
Public Key Encryption Keyword Search K-Resilient IBE
2008/12/24
An encrypted email is sent from Bob to Alice. A gateway
wants to check whether a certain keyword exists in an email or not for
some reason (e.g. routing). Nevertheless Alice does not want the email...
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
public-key encryption standard model ROM DDH
2008/11/21
In this paper, we present some more results about the security of
the Kurosawa-Desmedt encryption scheme [9] and a variant of it [13].
We prove that after a modification, those schemes are secure ag...
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search pairings provable secure
2008/11/10
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the keyword W, but learn...
Public Key Encryption that Allows PIR Queries
Searching on encrypted data Database security Public-key Encryption with special properties
2008/9/11
Consider the following problem: Alice wishes to maintain her email using a storageprovider
Bob (such as a Yahoo! or hotmail e-mail account). This storage-provider should
provide for Alice the abilit...
Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code
Public Key Cryptography Locally Decodable Codes Error Correcting Codes Bounded Channel Model Chinese Remainder Theorem Private Information Retrieval
2008/9/10
In this paper, we introduce the notion of a Public-Key Encryption Scheme that is also a Locally-Decodable Error-Correcting Code (PKLDC). In essence, this is a protocol that is semantically-secure in t...
Some General Consequences on Chosen-ciphertext Anonymity in Public-Key Encryption
Computational Cryptography Provable Security Anonymity Master-key Anonymity
2008/8/27
In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired. In this paper some new and general concepts in public-key encry...
For all current adaptive chosen ciphertext(CCA) secure public key encryption schemes in standard model there are two operations in the decryption algorithm, “validity check” and decryption.
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
certificateless encryption malicious KGC attack standard model
2008/8/18
Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected se-
curity concern for certificateless public key encryption (CL-PKE) scheme, where a
malicious key generation center (KGC) can...
A New Security Definition for Public Key Encryption Schemes and Its Applications
Public Key Encryption Adaptive Chosen Ciphertext Attacks Standard Model
2008/5/30
The strongest security definition for public key encryption (PKE) schemes
is indistinguishability against adaptive chosen ciphertext attacks (IND-CCA).