搜索结果: 31-45 共查到“军事学 Identity-based encryption”相关记录98条 . 查询时间(0.062 秒)
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
IBE HIBE standard model
2016/1/8
We provide a generic transformation from any affine message authentication code (MAC) to an
identity-based encryption (IBE) scheme over pairing groups of prime order. If the MAC satisfies
a security...
Efficient Identity-Based Encryption over NTRU Lattices
Lattice Cryptography Identity-Based Encryption Digital Signatures
2016/1/6
Efficient implementations of lattice-based cryptographic schemes
have been limited to only the most basic primitives like encryption
and digital signatures. The main reason for this limitation is th...
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method
Revocable identity-based encryption Lattice techniques Subset difference method
2016/1/4
In view of the expiration or reveal of user’s private credential (or private key) in a realistic
scenario, identity-based encryption (IBE) schemes with an efficient key revocation mechanism,
or for ...
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
identity-based encryption tight security bilinear maps
2016/1/4
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very
strong sense. Specifically, we consider a setting with many instances of the scheme and
many encryptions per i...
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
identity-based encryption chosen ciphertext security selective opening security
2015/12/31
Security against selective opening attack (SOA) requires that in a multi-user setting, even
if an adversary has access to all ciphertexts from users, and adaptively corrupts some fraction of the
use...
A Framework for Identity-Based Encryption with Almost Tight Security
Tight security reduction identity-based encryption multi-challenge security
2015/12/29
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tightly secure in the multi-challenge and multi-instance setting. In particular, we formalize a new notio...
On the Power of Hierarchical Identity-Based Encryption
Hierarchical Identity-based Encryption Collision Resistant Hashing Black-Box Separations
2015/12/23
We prove that there is no fully black-box construction of collision-resistant hash functions
(CRH) from hierarchical identity-based encryption (HIBE) with arbitrary polynomial number
of identity lev...
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
Identity-based encryption Hierarchical identity-based encryption Revocation
2015/12/23
Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE)
where an identity of a user is organized as a hierarchical structure and a user can delegate the priva...
Idealizing Identity-Based Encryption
identity-based encryption definitions impossibility results
2015/12/23
We formalize the standard application of identity-based encryption (IBE), namely noninteractive
secure communication, as realizing an ideal system which we call delivery controlled
channel (DCC). Th...
New Results on Identity-based Encryption from Quadratic Residuosity
New Results Quadratic Residuosity
2015/12/23
This invited talk surveys the results obtained so far in designing
identity-based encryption (IBE) schemes based on the quadratic
residuosity assumption (QRA). We begin by describing the first such
...
Almost-tight Identity Based Encryption against Selective Opening Attack
Identity based encryption Selective opening attack Dual system technique
2015/12/23
The paper presented an identity based encryption (IBE) under selective opening attack (SOA) whose
security is almost-tightly related to a set of computational assumptions. Our result is a combination...
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
Glassbox Security Model Identity Based Encryption RAM Scraper
2015/12/21
. Modern software ecosystem is data-centric. Data exfiltration due to the attacks
of Memory Scraper type malwares is an emerging threat. In this paper, we set up
an appropriate mathematical model ca...
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
New Constructions Multilinear Maps
2014/3/5
RIBE.Revoke(ID;T;RL;ST): This algorithm takes as input an identityID, a revocation time T, the revo-cation listRL, and the state ST. If (ID; )= 2ST, then it outputs ?since the private key ofIDwas not
...
New Efficient Identity-Based Encryption From Factorization
Identity-based encryption without pairings without lattices
2014/3/10
Identity Based Encryption (IBE) systems are often constructed using pairings or lattices. Three exceptions are due to Cocks in 2001, Boneh, Gentry and Hamburg in 2007, and Paterson and Srinivasan in 2...
Improvement of One Anonymous Identity-Based Encryption
Anonymous identity-based encryption bilinear groups of composite order
2014/3/10
In 2009, Seo et al. proposed an anonymous hierarchical identity-based encryption (IBE). The ciphertext consists of $(C_1, C_2, C_3, C_4)$, where $C_1$ is the blinded message, $C_4$ is the blinded iden...