搜索结果: 1-15 共查到“军队指挥学 ID-based”相关记录92条 . 查询时间(0.093 秒)
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
multi-proxy multi-signature scheme multi-signature scheme ID-based signature
2019/9/16
Multi-proxy multi-signature schemes are useful in distributed networks, where a group of users cooperatively could delegate their administrative rights to the users of another group, who are authorize...
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
insider attacks chosen ciphertext attacks modification
2018/4/25
At ACISP 2017, Wu et al. presented an identity-based encryption with equality test (IBEET) that considers to prevent insider attacks. To analyze its security, they proposed a new security notion for I...
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption
Identity-Based Revocation Delegation Attribute-Based Encryption
2017/11/20
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been proposed to implement fine-grained access control. Data owners encrypt data with a certain access policy so that only data users whose at...
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
PKG IND CCA
2017/3/6
ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certificate management like Public Key Infr...
A Novel Multi-factor ID-based Designated Verifier Signature scheme
cryptographic protocols digital signatures
2016/12/24
In a classic digital signature scheme, the global community is capable of verifying a signature. In a designated verifier scheme (DVS), only the designated verifier has this capability. In a classic D...
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
secret-key cryptography key distribution
2016/1/25
We study a method for key predistribution in a network of n users where pairwise keys are
computed by hashing users’ IDs along with secret information that has been (pre)distributed to
the network u...
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Cryptanalysis Remote User Authentication Key Agreement
2015/12/30
In 2012, Wen and Li proposed a secure and robust dynamic identity based remote user authentication
scheme with key agreement using smart cards. They claimed that their scheme is efficient
and secure...
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
Data storage public auditability privacy preserving
2015/12/29
One of the most important benefits of public cloud storage
is outsourcing of management and maintenance with easy accessibility
and retrievability over the internet. However, outsourcing data on the...
On the Security of ID Based Signcryption Schemes
public-key cryptography / cryptanalysis provable security ID-based signcryption
2012/8/28
A signcryption scheme is secure only if it satisfies both the confidentiality and the unforgeability properties. All the ID based signcryption schemes presented in the standard model till now do not h...
On the Security of ID Based Signcryption Schemes
S. Sharmila Deva Selvi S. Sree Vivek Dhinakaran Vinayagamurthy C. Pandu Rangan
2012/6/14
A signcryption scheme is secure only if it satisfies both the confidentiality and the unforgeability properties. All the ID based signcryption schemes presented in the standard model till now do not h...
Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation
Identity-based Encryption Trapdoor DL Groups Discrete Logarithm Pre-computation
2012/3/28
The existing identity-based encryption (IBE) schemes based on pairings require pairing computations in encryption or decryption algorithm and it is a burden to each entity which has restricted computi...
A Multi-Receiver ID-Based Generalized Signcryption Scheme
public-key cryptography / Multi-receiver identity-based generalized signcryption
2012/6/14
Generalized signcryption(GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. In this paper, the formal definition and security notion...
A Multi-Receiver ID-Based Generalized Signcryption Scheme
public-key cryptography / Multi-receiver identity-based generalized signcryption Bilinear pairing Provable security andomness re-use Selective identity security Random oracle model
2012/3/22
Generalized signcryption(GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. In this paper, the formal definition and security notion...
A Multi-Receiver ID-Based Generalized Signcryption Scheme
public-key cryptography / Multi-receiver identity-based generalized signcryption Bilinear pairing Provable security Randomness re-use Selective identity security Random oracle model
2012/3/21
Generalized signcryption(GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. In this paper, the formal definition and security notion...
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
cryptographic protocols / Authentication smart cards dynamic ID multi-server system password attack
2012/3/28
The security of a dynamic ID-based remote user authentication scheme for multi-server environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-X., A Secure Dynamic ID based...