搜索结果: 46-60 共查到“军事学 standard model”相关记录69条 . 查询时间(0.149 秒)
A Framework for Efficient Signatures,Ring Signatures and Identity Based Encryption in the Standard Model
Framework Efficient Signatures Ring Signatures Identity Based Encryption Standard Model
2010/3/16
In this work, we present a generic framework for constructing e±cient signature scheme, ring
signature schemes, and identity based encryption schemes, all in the standard model (without
relying on r...
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
Efficient Public-Key Encryption Computational Diffie-Hellman Standard Model
2010/2/1
This paper proposes practical chosen-ciphertext secure public-key encryption systems that
are provably secure under the computational Die-Hellman assumption, in the standard model.
Our schemes are ...
Generic One Round Group Key Exchange in the Standard Model
Group Key Exchange Key Encapsulation Mechanism Key Compromise Impersonation
2009/11/18
Minimizing complexity of group key exchange (GKE) protocols is an important milestone
towards their practical deployment. An interesting approach to achieve this goal is to simplify the
design of GK...
Efficient Certificateless KEM in the Standard Model
Efficient Certificateless KEM Standard Model
2009/9/27
We give a direct construction of a certificateless key encap-
sulation mechanism (KEM) in the standard model that is more ecient
than the generic constructions proposed before by Huang and Wong [9]...
Efficient Certificateless KEM in the Standard Model
Efficient Certificateless KEM Standard Model
2009/9/22
We give a direct construction of a certificateless key encap-
sulation mechanism (KEM) in the standard model that is more efficient
than the generic constructions proposed before by Huang and Wong [...
New DLOG-Based Convertible Undeniable Signature Schemes in the Standard Model
Undeniable signature selective/all conversion discrete logarithm
2009/8/18
We propose discrete-logarithm-based undeniable signature schemes supporting both
We propose discrete-logarithm-based undeniable signature schemes supporting both
selective and all conversion, with f...
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
CCA2 Secure Public Key Encryption Scheme McEliece Assumptions Standard Model
2009/6/9
We show that a recently proposed construction by Rosen and Segev can be
used for obtaining the first public key encryption scheme based on the McEliece
assumptions which is secure against adaptive c...
Searchable encryption with decryption in the standard model
Searchable encryption decryption standard model
2009/6/9
A searchable public key encryption (PEKS) scheme allows to generate, for any given message
W, a trapdoor TW, such that TW allows to check whether a given ciphertext is an encryption ofW or
not. Of c...
Leakage-Resilient Cryptography in the Standard Model
Leakage-Resilient Cryptography Standard Model
2009/6/5
We construct a stream-cipher S whose implementation is secure even if arbitrary (adversely
chosen) information on the internal state of S is leaked during computation. This
captures all possible sid...
A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm
IND-CCA2 public-key encryption DDH- Assumption DBDH-Assumption
2009/6/3
We present a public-key encryption scheme which is provably secure against adaptive chosen ciphertext
attack. The scheme is constructed using Cramer-Shoup paradigm [7]. The security of the scheme is ...
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
Chosen-ciphertext security Identity-Based Encryption Bilinear Maps
2009/6/2
We propose two constructions of chosen-ciphertext secure identity-based encryption (IBE) schemes.
Our schemes have a security proof in the standard model, yet they offer performance competitive
with...
We consider one-round key exchange protocols secure in the standard model.
The security analysis uses the powerful security model of Canetti and Krawczyk and a
natural extension of it to the ID-base...
The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model
Cramer-Shoup Encryption Scheme Plaintext Aware Standard Model
2009/2/23
In this paper we examine the security criteria for a KEM
and a DEM that are sufficient for the overall hybrid encryption scheme
to be plaintext-aware in the standard model. We apply this theory to
...
Secure Cryptographic Workflow in the Standard Model
Cryptographic Workflow Key Encapsulation Secret Sharing
2009/1/6
Following the work of Al-Riyami et al. we define the notion
of key encapsulation mechanism supporting cryptographic workflow
(WF-KEM) and prove a KEM-DEM composition theorem which
extends the notio...
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
Self-Generated-Certificate Public Key Cryptography Certificateless Signature Encryption Scheme Standard Model
2008/12/25
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of
Identity-Based Cryptography (IBC) while without having the problem of key escrow. However,
it does suffer to an attack...