搜索结果: 1-15 共查到“军事学 Efficient Identity”相关记录17条 . 查询时间(0.084 秒)
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"
attack trapdoor subgroup congruential equations
2016/5/30
In this short report we analyse the security of three schemes proposed by J. H. Park et al. in "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups". The schemes make ...
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups
identity-based encryption trapdoor subgroup RSA modulus
2016/5/24
We present a new Identity-Based Encryption (IBE) scheme from a trapdoor subgroup of Z∗n for an RSA modulus n. In a trapdoor subgroup of Z∗n, a subgroup order is hidden and can be used as a...
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
cryptographic protocols wireless sensor networks
2016/1/26
Recently, Shm et al. Proposed an efficient identity-based broadcast authentication
scheme based on Tso et al.’s IBS scheme with message recovery to achieve security
requirements in wireless sensor n...
Efficient Identity-Based Encryption over NTRU Lattices
Lattice Cryptography Identity-Based Encryption Digital Signatures
2016/1/6
Efficient implementations of lattice-based cryptographic schemes
have been limited to only the most basic primitives like encryption
and digital signatures. The main reason for this limitation is th...
New Efficient Identity-Based Encryption From Factorization
Identity-based encryption without pairings without lattices
2014/3/10
Identity Based Encryption (IBE) systems are often constructed using pairings or lattices. Three exceptions are due to Cocks in 2001, Boneh, Gentry and Hamburg in 2007, and Paterson and Srinivasan in 2...
ID-GC: An Efficient Identity-based Group Key Management Scheme
ID-GC Efficient Identity-based Group Key Management Scheme
2009/6/11
We present an efficient identity-based key management
scheme for group communications (ID-GC). ID-GC outperforms
all existing group key management schemes in
terms of reducing the communication ove...
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
Multiple Receivers Signcryption Identity-Based Cryptography
2009/6/5
This paper puts forward a new efficient construction for Multi-Receiver Signcryption
in the Identity-based setting. We consider a scenario where a user wants to securely send a message
to a dynamica...
An Efficient Identity-based Ring Signcryption Scheme
Identity-based cryptography ring signcryption bilinear pairing
2009/6/5
ID-based ring signcryption schemes (IDRSC) are usually derived from bilinear
parings, a powerful but computationally expensive primitive. The number of paring
computations of all existing ID-based r...
Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings
Exponent Group Signature Schemes Efficient Identity Signature Schemes
2009/4/13
Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings.
Efficient Identity Based Ring Signature
Identity-based signature ring signature bilinear pairings
2009/4/2
Identity-based (ID-based) cryptosystems eliminate the need
for validity checking of the certificates and the need for registering for a
certificate before getting the public key. These two features ...
Efficient Identity-Based Encryption Without Random Oracles
Efficient Identity-Based Encryption Random Oracles
2009/3/27
We present the first efficient Identity-Based Encryption (IBE) scheme that is fully secure
without random oracles. We first present our IBE construction and reduce the security of our
scheme to the ...
Efficient Identity-Based Encryption with Tight Security Reduction
ID-based encryption tight security reduction
2009/3/4
In a famous paper of Crypto'01, Boneh and Franklin pro-
posed the first identity-based encryption scheme (IBE), around fifteen
years after the concept was introduced by Shamir. Their scheme security...
Efficient Identity-Based Key Encapsulation to Multiple Parties
Key Encapsulation Mechanism (KEM) Hybrid Encryption Identity Based Cryptography
2009/2/17
We introduce the concept of identity based key encapsulation
to multiple parties (mID-KEM), and define a security model for it. This
concept is the identity based analogue of public key KEM to mult...
Efficient Identity-Based and Authenticated Key Agreement Protocol
Efficient Identity-Based Authenticated Key Agreement Protocol
2009/1/23
Several identity based and authenticated key agreement protocols have been proposed in
recent years and all of them have been shown to be non-secure. It remains an open question
to design secure ide...
An efficient identity-based authenticated key agreement from pairing
authenticated key agreement identity-based cryptography Tate pairing
2009/1/22
We propose a two-party identity-based key agreement and key agreement with confirmation from pairing.It is inspired on a new Identity-Based Authenticated Key Agreement first proposed by Noel McCullagh...