搜索结果: 31-45 共查到“军事学 standard model”相关记录69条 . 查询时间(0.039 秒)
Efficient Network Coding Signatures in the Standard Model
public-key cryptography / digital signatures network coding
2012/3/20
Network Coding is a routing technique where each node may actively modify the received packets before transmitting them. While this departure from passive networks improves throughput and resilience t...
A non-interactive deniable authentication scheme in the standard model
public-key cryptography
2012/3/20
Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast to interact...
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
identity based encryption standard model CCA securiy CBDH assumption
2012/6/14
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
identity based encryption standard model CCA security CBDH assumption
2012/3/22
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
identity based encryption standard model CCA security CBDH assumption
2012/3/21
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
A Standard-Model Security Analysis of TLS-DHE
cryptographic protocols / Authenticated key agreement SSL TLS provable security ephemeral Diffie-Hellman
2012/3/28
TLS is the most important cryptographic protocol in use today. However, up to now there is no complete cryptographic security proof in the standard model, nor in any other model. We give the first suc...
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
attribute-based signatures multi-authority system non-monotone predicates
2012/8/28
This paper presents a fully secure (adaptive-predicate unforgeable and private) attribute-based signature (ABS) scheme in the standard model. The security of the proposed ABS scheme is proven under st...
Efficient Network Coding Signatures in the Standard Model
digital signatures network coding
2012/8/28
Network Coding is a routing technique where each node may actively modify the received packets before transmitting them. While this departure from passive networks improves throughput and resilience t...
A non-interactive deniable authentication scheme in the standard model
public-key cryptography
2012/8/28
Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast to interact...
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
cryptographic protocols / attribute-based signatures Groth-Sahai proofs unforgeability non-linkability revocability
2012/3/29
An attribute-based signature with respect to a signing policy, chosen ad-hoc by the signer, convinces the verifier that the signer holds a subset of attributes satisfying that signing policy. Ideally,...
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
attribute-based signatures Groth-Sahai proofs unforgeability non-linkability revocability
2011/2/23
An attribute-based signature with respect to a signing policy, chosen ad-hoc by the signer, convinces the verifier that the signer holds a subset of attributes satisfying that signing policy. Ideally,...
On the Impossibility of Instantiating PSS in the Standard Model
PSS Blackbox Reductions Randomized Signature Standard Model
2010/12/22
In this paper we consider the problem of securely instantiating Probabilistic Signature Scheme (PSS) in the standard model. PSS, proposed by Bellare and Rogaway \cite{BellareR96} is a widely deployed ...
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Cryptanalysis Two Efficient HIBE Schemes Standard Model
2010/4/7
In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity
based encryption scheme based on the q-ABDHE problem with full security in the standard model.
Later in Indocrypt’08,...
Sanitizable signatures with strong transparency in the standard model
sanitizable signatures strong transparency standard model
2010/4/7
Sanitizable signatures provide several security features which
are useful in many scenarios including military and medical applications.
Sanitizable signatures allow a semi-trusted party to update s...
Cryptanalysis of an Efficient HIBE Scheme in the Standard Model
Cryptanalysis Efficient HIBE Scheme Standard Model
2010/3/16
In Informatica 32 (2008), Ren and Gu [11] proposed an anonymous hierarchical identity
based encryption scheme based on the q-ABDHE problem with full security in the standard model.
They also claimed...