搜索结果: 16-30 共查到“军事学 identity based encryption”相关记录98条 . 查询时间(0.171 秒)
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs
Physically Unclonable Functions Identity based Encryption Internet of Things
2017/5/23
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs). In traditional authentica...
Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance
RIBE DKER
2017/4/17
A revocable identity-based encryption (RIBE) scheme, proposed by Boldyreva et al.\ (CCS'08), provides a revocation functionality for managing a number of users dynamically and efficiently. To capture ...
Attribute-Based Encryption from Identity-Based Encryption
attribute-based encryption identity-based encryption constant-size ciphertexts/keys
2017/3/6
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the acc...
Attribute-Based Encryption Implies Identity-Based Encryption
attribute-based encryption identity-based encryption
2017/2/20
In this short paper we formally prove that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes. In more detail, we show how an attribute-base...
Revocable Hierarchical Identity-Based Encryption with Adaptive Security
Hierarchical identity-based encryption Key revocation Adaptive security
2016/12/12
Hierarchical identity-based encryption (HIBE) can be extended to revocable HIBE (RHIBE) if a private key of a user can be revoked when the private key is revealed or expired. Previously, many selectiv...
Server-Aided Revocable Identity-Based Encryption from Lattices
lattice techniques public-key cryptography
2016/12/8
Server-aided revocable identity-based encryption (SR-IBE), recently proposed by Qin et al.
at ESORICS 2015, offers significant advantages over previous user revocation mechanisms in the scope
of IBE...
KDM Security for Identity-Based Encryption: Constructions and Separations
KDM security IBE IB-HPS
2016/12/8
For encryption schemes, key dependent message (KDM) security requires that ciphertexts preserve secrecy even when the encrypt messages may depend on the secret keys. While KDM security has been extens...
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"
attack trapdoor subgroup congruential equations
2016/5/30
In this short report we analyse the security of three schemes proposed by J. H. Park et al. in "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups". The schemes make ...
Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited
public-key cryptography identity-based encryption
2016/5/30
We revise Boneh-Gentry-Hamburg’s identity-based encryption schemes and we show that we can
renounce to the use of pseudo-random functions. We then prove IND-ID-CPA and ANON-IND-ID-CPA
security of th...
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups
identity-based encryption trapdoor subgroup RSA modulus
2016/5/24
We present a new Identity-Based Encryption (IBE) scheme from a trapdoor subgroup of Z∗n for an RSA modulus n. In a trapdoor subgroup of Z∗n, a subgroup order is hidden and can be used as a...
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys
Identity-based encryption Hierarchical identity-based encryption Key revocation
2016/5/17
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that supports the
revocation of user’s private keys to manage the dynamic credentials of users in a system. Many diffe...
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
public-key cryptography Asymptotically Shorter Public Parameters
2016/2/23
In this paper, we present two new adaptively secure identity-based encryption (IBE) schemes from lattices. The size of the public parameters, ciphertexts, and private keys are O~(n2κ1/d), O~(n), and O...
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
Identity-based encryption Bounded-CCA security
2016/1/26
Identity-based encryption (IBE) is a special case of public-key encryption where
user identities replace public keys. Every user is given a corresponding secret key for decryption,
and encryptions f...
Efficient Revocable Identity-Based Encryption via Subset Difference Methods
Identity-based encryption Revocable identity-based encryption Key revocation
2016/1/25
Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important
since a user’s credential (or private key) can be expired or revealed. Revocable IBE (RIBE) is an ext...
Identity-based encryption and digital signature schemes using extended chaotic maps
Chaotic maps Identity-based encryption Digital signature
2016/1/23
This paper designed a new extended chaotic map-based Identity-based encryption (ECM-IBE) scheme and Identitybased digital signature (ECM-IDS) scheme using extended chaotic maps. The security of the E...