搜索结果: 106-120 共查到“军事学 Public key encryption”相关记录131条 . 查询时间(0.234 秒)
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes
Secure Public-Key Encryption Length-Preserving Chaumian Mixes
2009/4/15
Mix chains as proposed by Chaum allow sending untraceable
electronic e-mail without requiring trust in a single authority: messages
are recursively public-key encrypted to multiple intermediates (mi...
A Forward-Secure Public-Key Encryption Scheme
A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions
CCA2-Secure Public-Key Encryption General Assumptions
2009/4/14
In this paper we present a simpler construction of a public-key encryption scheme that
achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations.
We build ...
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem
Cryptanalysis Augot and Finiasz cryptosystem Polynomial Reconstruction Problem
2009/4/10
At Eurocrypt 2003, Augot and Finiasz proposed a new public-key encryp-
tion scheme based on the polynomial reconstruction problem [1]. The scheme was subse-
quently broken in [5], who showed that gi...
We study the problem of searching on data that is encrypted using a public key system.
Consider user Bob who sends email to user Alice encrypted under Alice's public key. An email
gateway wants to t...
A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack
Decisional Diffie-Hellman assumption elliptic curve standard intractability paradigm
2009/4/9
We study elliptic curve cryptosystems by first investigating
the schemes defined over Zp and show that the scheme is provably secure
against adaptive chosen cipher-text attack under the decisional D...
A Forward-Secure Public-Key Encryption Scheme
Bilinear Diffe-Hellman Encryption Binary-tree encryption
2009/4/9
Cryptographic computations are often carried out on insecure devices for which the threat
of key exposure represents a serious and realistic concern. In an eort to mitigate the damage
caused by exp...
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
public-key encryption scheme polynomial reconstruction problem
2009/4/8
We describe a cryptanalysis of a public-key encryption scheme based on the
polynomial reconstruction problem . Given the public-key and a ciphertext, we recover
the corresponding plaintext in polyno...
Adaptively-Secure, Non-Interactive Public-Key Encryption
Public-key encryption adaptive security forward security
2009/4/1
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary
who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret
data of already-c...
Timed-Release and Key-Insulated Public Key Encryption
timed-release authenticated encryption key-insulated encryption
2009/3/27
In this paper we consider two security notions related to
Identity Based Encryption: Key-insulated public key encryption, introduced
by Dodis, Katz, Xu and Yung; and Timed-Release Public Key
crypto...
Towards Plaintext-Aware Public-Key Encryption without Random Oracles
Encryption theory plaintext awareness chosen-ciphertext attacks
2009/3/27
We consider the problem of de¯ning and achieving plaintext-aware encryption without random
oracles in the classical public-key model. We provide de¯nitions for a hierarchy of notions
of in...
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
timed release encryption bilinear pairing anonymity
2009/3/27
We consider the problem of sending messages into the future, commonly known as timed
release cryptography. Existing schemes for this task either solve the relative time problem
with uncontrollable, ...
An Authenticated Certificateless Public Key Encryption Scheme
Authenticated Public Key Encryption confidentiality
2009/3/27
An Authenticated Certificateless Public Key Encryption Scheme.
On the Security of a Certificateless Public-Key Encryption
Security Certificateless Public-Key Encryption
2009/3/18
On the Security of a Certificateless Public-Key Encryption.
Provable Efficient Certificateless Public Key Encryption
Provable Efficient Certificateless Public Key Encryption
2009/2/26
Certificateless public key cryptography was introduced to
overcome the key escrow limitation of the identity-based cryptography.
It combines the advantages of the identity-based cryptography and the...