搜索结果: 1-15 共查到“军队指挥学 HIBE”相关记录15条 . 查询时间(0.109 秒)
From Selective IBE to Full IBE and Selective HIBE
public key encryption identity-based encryption Hierarchical Identity-Based-Encryption
2017/9/30
Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constructions of fully secure IBE and selectively secure hierarchical IBE (HIBE) schemes. Our HIBE scheme a...
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Identity-based Signatures Sequential Aggregate Signatures the CDH Assumption
2017/4/12
Identity-based sequential aggregate signature (IBSAS) schemes are usually applied to secure network routing and sensor networks, since they allow multiple signers to sequentially produce a short signa...
Dual System Groups and its Applications --- Compact HIBE and More
public-key cryptography prime-order groups
2016/1/23
We show how to instantiate dual system groups under the decisional subgroup assumption in composite-order groups and the decisional linear assumption (d-LIN) in prime-order groups. Along the way, we p...
(Anonymous) Compact HIBE From Standard Assumptions
constant-size ciphertext HIBE asymmetric pairings
2014/3/5
We present two hierarchical identity-based encryption (HIBE) schemes, denoted as $\ahibe$ and $\hibe$, from Type-3 pairings with constant sized ciphertexts. Scheme $\ahibe$ is anonymous and $\hibe$ is...
Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption
hierarchical identity-based encryption (HIBE) anonymous HIBE
2014/3/10
We present the first anonymous hierarchical identity based encryption (HIBE) scheme using Type-3 pairings with adaptive security based on standard assumptions. Previous constructions of anonymous HIBE...
Proving security of Hierarchical Identity-Based Encryption (HIBE) and Attribution Based Encryption scheme is a challenging problem. There are multiple well-known schemes in the literature where the be...
In this work, we present HIBE and ABE schemes which are ``unbounded" in the sense that the public parameters do not impose additional limitations on the functionality of the systems. In all previous c...
In this work, we present HIBE and ABE schemes which are ``unbounded" in the sense that the public parameters do not impose additional limitations on the functionality of the systems. In all previous c...
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Cryptanalysis Two Efficient HIBE Schemes Standard Model
2010/4/7
In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity
based encryption scheme based on the q-ABDHE problem with full security in the standard model.
Later in Indocrypt’08,...
Cryptanalysis of an Efficient HIBE Scheme in the Standard Model
Cryptanalysis Efficient HIBE Scheme Standard Model
2010/3/16
In Informatica 32 (2008), Ren and Gu [11] proposed an anonymous hierarchical identity
based encryption scheme based on the q-ABDHE problem with full security in the standard model.
They also claimed...
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction
of Boneh, Boyen, and Goh was only proven to be secure in the selective model,
under a non-static assumption ...
Dual System Encryption:Realizing Fully Secure IBE and HIBE under Simple Assumptions
Dual System Encryption Secure IBE HIBE
2009/8/18
We present a new methodology for proving security of encryption systems using what we call
Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption (IBE)
and Hierarchi...
Generalization of the Selective-ID Security Model for HIBE Protocols
Selective-ID Security Model HIBE Protocols
2008/11/28
We generalize the selective-ID security model for HIBE by introducing two new security
models. Broadly speaking, both these models allow the adversary to commit to a set of identities and in
the cha...
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
Constant Size Ciphertext HIBE Augmented Selective-ID Model Extensions
2008/9/10
At Eurocrypt 2005, Boneh, Boyen and Goh presented a constant size ciphertext hierarchical
identity based encryption (HIBE) protocol. Our main contribution is to present a variant of the
BBG-HIBE.
At Eurocrypt 2005, Boneh, Boyen, and Goh presented a hierarchical IBE for which they
claimed a novel property, called limited delegation: it is possible to give an entity a private key that restricts...