军事学 >>> 军事学
搜索结果: 106-120 共查到军事学 Public key encryption相关记录131条 . 查询时间(0.234 秒)
Mix chains as proposed by Chaum allow sending untraceable electronic e-mail without requiring trust in a single authority: messages are recursively public-key encrypted to multiple intermediates (mi...
A Forward-Secure Public-Key Encryption Scheme
In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build ...
At Eurocrypt 2003, Augot and Finiasz proposed a new public-key encryp- tion scheme based on the polynomial reconstruction problem [1]. The scheme was subse- quently broken in [5], who showed that gi...
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice's public key. An email gateway wants to t...
We study elliptic curve cryptosystems by first investigating the schemes defined over Zp and show that the scheme is provably secure against adaptive chosen cipher-text attack under the decisional D...
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious and realistic concern. In an e ort to mitigate the damage caused by exp...
We describe a cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem . Given the public-key and a ciphertext, we recover the corresponding plaintext in polyno...
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret data of already-c...
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release Public Key crypto...
We consider the problem of de¯ning and achieving plaintext-aware encryption without random oracles in the classical public-key model. We provide de¯nitions for a hierarchy of notions of in...
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem with uncontrollable, ...
On the Security of a Certificateless Public-Key Encryption.
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...