军事学 >>> 军事学
搜索结果: 1-7 共查到军事学 Efficient Identity-Based Encryption相关记录7条 . 查询时间(0.172 秒)
In this short report we analyse the security of three schemes proposed by J. H. Park et al. in "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups". The schemes make ...
We present a new Identity-Based Encryption (IBE) scheme from a trapdoor subgroup of Z∗n for an RSA modulus n. In a trapdoor subgroup of Z∗n, a subgroup order is hidden and can be used as a...
Efficient implementations of lattice-based cryptographic schemes have been limited to only the most basic primitives like encryption and digital signatures. The main reason for this limitation is th...
Identity Based Encryption (IBE) systems are often constructed using pairings or lattices. Three exceptions are due to Cocks in 2001, Boneh, Gentry and Hamburg in 2007, and Paterson and Srinivasan in 2...
We present the first efficient Identity-Based Encryption (IBE) scheme that is fully secure without random oracles. We first present our IBE construction and reduce the security of our scheme to the ...
In a famous paper of Crypto'01, Boneh and Franklin pro- posed the first identity-based encryption scheme (IBE), around fifteen years after the concept was introduced by Shamir. Their scheme security...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on t...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...