搜索结果: 1-15 共查到“军事学 Identity Based Encryption”相关记录98条 . 查询时间(0.163 秒)
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
Lattices Identity-based encryption Revocation
2019/8/14
As an extension of identity-based encryption (IBE), revocable hierarchical IBE (RHIBE) supports both key revocation and key delegation simultaneously, which are two important functionalities for crypt...
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods
Revocable identity-based encryption Subset difference method Generic construction
2019/7/15
To deal with dynamically changing user's credentials in identity-based encryption (IBE), providing an efficient key revocation method is a very important issue. Recently, Ma and Lin proposed a generic...
Identity-Based Encryption from e-th Power Residue Symbols
identity-based encryption ee-th power residue symbol the general reciprocity law on function fields
2019/5/27
This paper generalizes the notable Galbrath's test by introducing the general reciprocity law on function fields. With the help of the extended Galbrath's test, we show the scheme of Boneh, LaVigne an...
A Generic Construction of Revocable Identity-Based Encryption
Generic Construction Revocable Identity-Based Encryption
2019/3/21
Revocable identity-based encryption (RIBE) is an extension of IBE that supports a key revocation mechanism, which is important when deployed an IBE system in practice. Boneh and Franklin presented the...
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Leakage-resilience Bounded retrieval model Identity-based Encryption
2019/1/26
We propose new constructions of leakage-resilient public-key encryption (PKE) and identity-based encryption (IBE) schemes in the bounded retrieval model (BRM). In the BRM, adversaries are allowed to o...
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
deterministic identity-based encryption adaptively secure auxiliary-input
2019/1/26
There only exists one deterministic identity-based encryption (DIBE) scheme which is adaptively secure in the auxiliary-input setting, under the learning with errors (LWE) assumption. However, the mas...
Tightly secure hierarchical identity-based encryption
hierarchical identity-based encryption tight security affine message authentication codes
2019/1/26
We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the ...
Downgradable Identity-based Encryption and Applications
Identity-Based Encryption Attribute-Based Encryption
2018/12/3
In Identity-based cryptography, in order to generalize one receiver encryption to multi-receiver encryption, wildcards were introduced: WIBE enables wildcard in receivers' pattern and Wicked-IBE allow...
Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks
identity-based encryption chosen-ciphertext security tight security reductions
2018/11/16
We propose the first identity-based encryption (IBE) scheme that is (almost) tightly secure against chosen-ciphertext attacks. Our scheme is efficient, in the sense that its ciphertext overhead is onl...
On the security of Jhanwar-Barua Identity-Based Encryption Scheme
identity based encryption ibe
2018/5/28
In 2008, Jhanwar and Barua presented an improvement of the Boneh-Gentry-Hamburg (BGH) scheme. In addition to reducing the time complexity of the algorithm to find a solution of the equation ax2+Sy2≡1m...
Revocable Identity-based Encryption from Codes with Rank Metric
Code-based Cryptography Identity-based Encryption Key Revocation
2018/5/2
In this paper, we present an identity-based encryption scheme from codes with efficient key revocation. Recently, in Crypto 2017, Gaborit et al. proposed a first identity-based encryption scheme from ...
A Practical Implementation of Identity-Based Encryption over NTRU Lattices
lattice-based cryptography identity-based encryption NTRU
2017/11/1
An identity-based encryption scheme enables the efficient distribution of keys in a multi-user system. Such schemes are particularly attractive in resource constrained environments where critical reso...
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
Identity-based encryption Key dependent message security Receiver selective opening security
2017/10/10
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key dependent message (KDM) security for user secret keys. The second one is IBE satisfying simulation-based r...
Identity-Based Encryption from the Diffie-Hellman Assumption
public-key cryptography Identity-Based Encryption
2017/6/9
We provide the first constructions of identity-based encryption and hierarchical identity-based encryption based on the hardness of the (Computational) Diffie-Hellman Problem (without use of groups wi...
Identity-based Encryption from Codes with Rank Metric, Full Version
Code-based cryptography Rank metric IBE
2017/6/6
Code-based cryptography has a long history, almost as long as the history of public-key encryption (PKE). While we can construct almost all primitives from codes such as PKE, signature, group signatur...