搜索结果: 1-5 共查到“军事学 IBE scheme”相关记录5条 . 查询时间(0.101 秒)
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
DLIN assumption fully secure IBE canceling parameter hiding dual system encryption
2013/4/18
In Eurocrypt 2012, Lewko presented a fully secure IBE scheme in the prime order setting based on the decisional linear assumption. We note that some random factor involved in the ciphertext can furthe...
Simulation without the Artificial Abort:Simplified Proof and Improved Concrete Security for Waters’IBE Scheme
Artificial Abort Simplified Proof Improved Concrete Security Waters’IBE Scheme
2009/6/12
Waters’ variant of the Boneh-Boyen IBE scheme is attractive because of its efficency, appli-
cations, and security attributes, but suffers from a relatively complex proof with poor concrete
security...
An IBE Scheme to Exchange Authenticated Secret Keys
Identity-based cryptosystem pairing bilinear map elliptic curve cryptography
2009/3/25
We present a variant of the Boneh & Franklin Identiybased
Encryption IBE scheme to derive an authenticated symmetric
key-exchange protocol, when combined with a signature
scheme. Our protocol uses ...
From Selective-ID to Full Security:The Case of the Inversion-Based Boneh-Boyen IBE Scheme
Identity-based Encryption full-ID security
2008/9/18
In this note we remark that the inversion-based selective-ID secure identity-based encryption
(IBE) scheme from Boneh and Boyen can be bootstrapped to full-ID security using
a technique by Waters.
REMARKS ON IBE SCHEME OF WANG AND CAO
Public-Key Encryption Identity-Based Encryption (IBE) IND-ID-CCA
2008/5/26
In this paper we analyze and find an anomaly in the security proof of the
identity-based encryption (IBE) scheme fullM-IBE of Wang and Cao [9], which is based
on mBDHP. Here we give another proof fo...