军事学 >>> 军事学 >>> 军事理论 军事史 军事心理学 战略学 战役学 战术学 军队指挥学 军制学 军队政治工作学 军事后勤学 军事地学 军事技术 军事学其他学科 军事学其他学科
搜索结果: 46-60 共查到军事学 standard model相关记录69条 . 查询时间(0.149 秒)
In this work, we present a generic framework for constructing e±cient signature scheme, ring signature schemes, and identity based encryption schemes, all in the standard model (without relying on r...
This paper proposes practical chosen-ciphertext secure public-key encryption systems that are provably secure under the computational Die-Hellman assumption, in the standard model. Our schemes are ...
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GK...
We give a direct construction of a certificateless key encap- sulation mechanism (KEM) in the standard model that is more ecient than the generic constructions proposed before by Huang and Wong [9]...
We give a direct construction of a certificateless key encap- sulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed before by Huang and Wong [...
We propose discrete-logarithm-based undeniable signature schemes supporting both We propose discrete-logarithm-based undeniable signature schemes supporting both selective and all conversion, with f...
We show that a recently proposed construction by Rosen and Segev can be used for obtaining the first public key encryption scheme based on the McEliece assumptions which is secure against adaptive c...
A searchable public key encryption (PEKS) scheme allows to generate, for any given message W, a trapdoor TW, such that TW allows to check whether a given ciphertext is an encryption ofW or not. Of c...
We construct a stream-cipher S whose implementation is secure even if arbitrary (adversely chosen) information on the internal state of S is leaked during computation. This captures all possible sid...
We present a public-key encryption scheme which is provably secure against adaptive chosen ciphertext attack. The scheme is constructed using Cramer-Shoup paradigm [7]. The security of the scheme is ...
We propose two constructions of chosen-ciphertext secure identity-based encryption (IBE) schemes. Our schemes have a security proof in the standard model, yet they offer performance competitive with...
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-base...
In this paper we examine the security criteria for a KEM and a DEM that are sufficient for the overall hybrid encryption scheme to be plaintext-aware in the standard model. We apply this theory to ...
Following the work of Al-Riyami et al. we define the notion of key encapsulation mechanism supporting cryptographic workflow (WF-KEM) and prove a KEM-DEM composition theorem which extends the notio...
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based Cryptography (IBC) while without having the problem of key escrow. However, it does suffer to an attack...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...