搜索结果: 1-6 共查到“军队指挥学 constant-size ciphertexts”相关记录6条 . 查询时间(0.109 秒)
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
attribute-based encryption constant-size ciphertexts decisional linear assumption
2016/1/25
We propose a key-policy attribute-based encryption (KP-ABE) scheme with constantsize
ciphertexts, whose semi-adaptive security is proven under the decisional linear (DLIN)
assumption in the standard...
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts
Jie Chen Hoon Wei Lim San Ling Huaxiong Wang
2012/6/14
In this paper, we propose two new spatial encryption (SE) schemes based on existing inner product encryption (IPE) schemes. Both of our SE schemes are fully secure under simple assumptions and in prim...
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts
public-key cryptography / Functional Encryption Spatial Encryption Inner Product Encryption
2012/3/22
In this paper, we propose two new spatial encryption (SE) schemes based on existing inner product encryption (IPE) schemes. Both of our SE schemes are fully secure under simple assumptions and in prim...
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts
public-key cryptography / Functional Encryption Spatial Encryption Inner Product Encryption
2012/3/21
In this paper, we propose two new spatial encryption (SE) schemes based on existing inner product encryption (IPE) schemes. Both of our SE schemes are fully secure under simple assumptions and in prim...
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Hierarchical Identity-Based Encryption (HIBE) Anonymous Hierarchical Identity Based Encryption Public-key Encryption with Keyword Search (PEKS)
2011/1/18
Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Base...
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
cryptographic protocols / anonymity
2012/3/30
Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Base...