搜索结果: 1-8 共查到“密码学 Diffie-Hellman assumption”相关记录8条 . 查询时间(0.093 秒)
Trapdoor Functions from the Computational Diffie-Hellman Assumption
Trapdoor Functions Computational Diffie-Hellman Assumption
2018/6/5
Trapdoor functions (TDFs) are a fundamental primitive in cryptography. Yet, the current set of assumptions known to imply TDFs is surprisingly limited, when compared to public-key encryption. We prese...
Identity-Based Encryption from the Diffie-Hellman Assumption
public-key cryptography Identity-Based Encryption
2017/6/9
We provide the first constructions of identity-based encryption and hierarchical identity-based encryption based on the hardness of the (Computational) Diffie-Hellman Problem (without use of groups wi...
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
Direct Anonymous Attestation Universal Composability Trusted Platform Module
2016/6/29
Direct Anonymous Attestation (DAA) is a cryptographic protocol for privacy-protecting authentication. It is standardized in the TPM standard and implemented in millions of chips. A variant of DAA is a...
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
identity based encryption standard model CCA securiy CBDH assumption
2012/6/14
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
identity based encryption standard model CCA security CBDH assumption
2012/3/22
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
identity based encryption standard model CCA security CBDH assumption
2012/3/21
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
AN OBSERVATION ABOUT VARIATIONS OF THE DIFFIE-HELLMAN ASSUMPTION
Diffie-Hellman Assumption SBB GSBB
2009/6/11
We generalize the Strong Boneh-Boyen (SBB) signature scheme
to sign vectors (GSBB). We show that if a particular (but most natural) aver-
age case reduction from SBB to GSBB exists, then the Strong ...
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
public key encryption CCA security the CDH assumption
2009/6/4
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public
key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computational
Diffie-Hellm...