搜索结果: 61-69 共查到“军事学 standard model”相关记录69条 . 查询时间(0.075 秒)
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
public-key encryption standard model ROM DDH
2008/11/21
In this paper, we present some more results about the security of
the Kurosawa-Desmedt encryption scheme [9] and a variant of it [13].
We prove that after a modification, those schemes are secure ag...
We study an extension of the well-known Abadi-Rogaway
logic with hashes. Previously, we have given a sound computational in-
terpretation of this extension using Canetti's oracle hashing. This paper...
Direct Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
Chosen-ciphertext security Identity-Based Encryption Bilinear Maps
2008/11/12
We describe a practical identity-based encryption scheme that is secure in the standard model
against chosen-ciphertext (IND-CCA2) attacks. Security is based on an assumption comparable to
(but slig...
Efficient Identity-based Signatures Secure in the Standard Model
Efficient Identity-based Signatures Secure Standard Model
2008/11/3
The only known construction of identity-based signatures that can be proven secure
in the standard model is based on the approach of attaching certificates to non-identity-based
signatures. This fol...
Generic Certificateless Encryption in the Standard Model
Generic Certificateless Encryption Standard Model
2008/9/9
Despite the large number of certificateless encryption schemes recently proposed, many of them have been found to be insecure under a practical attack called malicious-but-passive KGC attack, since th...
Certificateless Encryption Schemes Strongly Secure in the Standard Model
certificateless encryption standard model strong security
2008/9/5
This paper presents the first constructions for certificateless
encryption (CLE) schemes that are provably secure against strong ad-
versaries in the standard model. It includes both a generic const...
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
certificateless encryption malicious KGC attack standard model
2008/8/18
Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected se-
curity concern for certificateless public key encryption (CL-PKE) scheme, where a
malicious key generation center (KGC) can...
Towards Key-Dependent Message Security in the Standard Model
Key-dependent message security security proofs symmetric encryption schemes
2008/5/29
Standard security notions for encryption schemes do not guarantee any security
if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion
of security in the presence o...
In this paper, by elaborately choosing the parameters of Waters Hash function, we propose a new e±cient signature scheme. It is shown that the scheme is secure against strongly unforgeable chosen-mess...