搜索结果: 1-7 共查到“军队指挥学 Bilinear Pairing”相关记录7条 . 查询时间(0.051 秒)
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Proxy signature certificate-based message recovery
2016/1/26
In this paper, we propose the first provable secure certificate-based proxy signature with message
recovery without bilinear pairing. The notion of certificate-based cryptography was initially
intro...
Breaking a certificateless key agreement protocol withour bilinear pairing
public-key cryptography Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
2011/6/9
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. Man...
Recently, composite-order bilinear pairing has been shown to be useful in many cryptographic constructions. However, it is time-costly to evaluate. This is because the composite order should be at lea...
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
cryptographic protocols / oblivious transfer mutual authentication ID-based cryptosystem impersonation bilinear pairing
2012/3/29
As traditional oblivious transfer protocols are treated as cryptographic primitives in most cases, they are usually executed without the consideration of possible attacks, e.g., impersonation, replayi...
Enhanced Privacy ID (EPID) is a cryptographic scheme that enables the remote authenti-
cation of a hardware device while preserving the privacy of the device. EPID can be seen as a
direct anonymous ...
Chameleon Signature from Bilinear Pairing
Digital signatures bilinear pairing chameleon hashing
2009/4/10
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is tha...
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
timed release encryption bilinear pairing anonymity
2009/3/27
We consider the problem of sending messages into the future, commonly known as timed
release cryptography. Existing schemes for this task either solve the relative time problem
with uncontrollable, ...