搜索结果: 46-60 共查到“军事学 Identity-based encryption”相关记录98条 . 查询时间(0.171 秒)
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
public-key cryptography
2014/3/13
We put forward a new notion, function privacy, in identity-based encryption and, more generally, in functional encryption. Intuitively, our notion asks that decryption keys reveal essentially no infor...
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
public-key cryptography / identity-based encryption revocation delegation
2013/2/21
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted by hacking or the period of a contract expires. In the public key infrastructure setting, numerous ...
Revocable Identity-Based Encryption Revisited: Security Model and Construction
public-key cryptography / identity-based encryption revocation decryption key exposure
2013/2/21
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption (IBE) with {\em efficient} revocation, which we call revocable IBE (RIBE). One of the significant be...
A New Practical Identity-Based Encryption System
Public-key cryptography / Identity-based encryption bilinear maps
2013/2/21
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for standard IBE techniques. Our construction is based on a new framework for realizing an IBE trapdoor ...
Revocable Identity-Based Encryption from Lattices
public-key cryptography / Lattice-based Cryptography Key Revocation Identity-based Encryption Functional Encryption
2012/3/21
In this paper, we present an identity-based encryption (IBE) scheme from lattices with efficient key revocation. We adopt multiple trapdoors from the Agrawal-Boneh-Boyen and Gentry-Peikerty-Vaikuntana...
Revocable Identity-Based Encryption from Lattices
public-key cryptography / Lattice-based Cryptography Key Revocation Identity-based Encryption Functional Encryption
2012/3/23
In this paper, we present an identity-based encryption (IBE) scheme from lattices with efficient key revocation. We adopt multiple trapdoors from the Agrawal-Boneh-Boyen and Gentry-Peikerty-Vaikuntana...
Fuzzy Identity Based Encryption from Lattices
public-key cryptography / Functional Encryption Fuzzy IBE Lattices LWE
2012/3/27
Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysi...
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Hierarchical Identity-Based Encryption (HIBE) Anonymous Hierarchical Identity Based Encryption Public-key Encryption with Keyword Search (PEKS)
2011/1/18
Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Base...
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
cryptographic protocols / anonymity
2012/3/30
Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Base...
Breaking An Identity-Based Encryption Scheme based on DHIES
An Identity-Based Encryption Scheme DHIES
2010/12/16
We present collusion attacks against an Identity-based Encryption scheme based on DHIES that was proposed by Chen et al. at ASIACCS 2010. Our attacks recover the master secret key of the scheme, so in...
New Identity Based Encryption And Its Proxy Re-encryption
New Identity Encryption Proxy Re-encryption
2010/10/11
Identity based encryption(IBE) have been received great attention since Boneh and Franklin's breakthrough work on IBE by using bilinear groups. Till now, many IBE schemes relying on bilinear maps with...
Remarks about the Security Proofs of Boneh-Franklin’s Identity-Based Encryption
Security Proofs Boneh-Franklin’s Identity-Based Encryption
2010/3/16
Boneh and Franklin constructed the first practical
Identity-Based Encryption (IBE) scheme in 2001. They also
defined a formal security model for IBE and proved their
scheme (BF-IBE) to be secure in...
A Framework for Efficient Signatures,Ring Signatures and Identity Based Encryption in the Standard Model
Framework Efficient Signatures Ring Signatures Identity Based Encryption Standard Model
2010/3/16
In this work, we present a generic framework for constructing e±cient signature scheme, ring
signature schemes, and identity based encryption schemes, all in the standard model (without
relying on r...
Anonymous Fuzzy Identity-based Encryption for Similarity Search
predicate encryption anonymous fuzzy identity-based encryption inner-product encryption
2009/11/18
In this paper, we consider the problem of predicate encryption
and focus on the predicate for testing whether the hamming distance
between the attribute X of a data item and a target V is equal to (...
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
Identity Based Group Signatures Hierarchical Identity-Based Encryption
2009/7/14
A number of previous papers explored the notion of identity-based group signature. We
present a generic construction of identity-based group signatures. Our construction is based on the
Naor transfo...