搜索结果: 1-15 共查到“军队指挥学 Hierarchical Identity-Based-Encryption”相关记录18条 . 查询时间(0.091 秒)
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
Lattices Identity-based encryption Revocation
2019/8/14
As an extension of identity-based encryption (IBE), revocable hierarchical IBE (RHIBE) supports both key revocation and key delegation simultaneously, which are two important functionalities for crypt...
Tightly secure hierarchical identity-based encryption
hierarchical identity-based encryption tight security affine message authentication codes
2019/1/26
We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the ...
Revocable Hierarchical Identity-Based Encryption with Adaptive Security
Hierarchical identity-based encryption Key revocation Adaptive security
2016/12/12
Hierarchical identity-based encryption (HIBE) can be extended to revocable HIBE (RHIBE) if a private key of a user can be revoked when the private key is revealed or expired. Previously, many selectiv...
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys
Identity-based encryption Hierarchical identity-based encryption Key revocation
2016/5/17
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that supports the
revocation of user’s private keys to manage the dynamic credentials of users in a system. Many diffe...
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
IBE HIBE standard model
2016/1/8
We provide a generic transformation from any affine message authentication code (MAC) to an
identity-based encryption (IBE) scheme over pairing groups of prime order. If the MAC satisfies
a security...
On the Power of Hierarchical Identity-Based Encryption
Hierarchical Identity-based Encryption Collision Resistant Hashing Black-Box Separations
2015/12/23
We prove that there is no fully black-box construction of collision-resistant hash functions
(CRH) from hierarchical identity-based encryption (HIBE) with arbitrary polynomial number
of identity lev...
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
Identity-based encryption Hierarchical identity-based encryption Revocation
2015/12/23
Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE)
where an identity of a user is organized as a hierarchical structure and a user can delegate the priva...
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Hierarchical Identity-Based Encryption (HIBE) Anonymous Hierarchical Identity Based Encryption Public-key Encryption with Keyword Search (PEKS)
2011/1/18
Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Base...
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
cryptographic protocols / anonymity
2012/3/30
Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Base...
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
Identity Based Group Signatures Hierarchical Identity-Based Encryption
2009/7/14
A number of previous papers explored the notion of identity-based group signature. We
present a generic construction of identity-based group signatures. Our construction is based on the
Naor transfo...
Hierarchical Identity Based Encryption with Polynomially Many Levels
Hierarchical Identity Encryption Polynomially Many Levels
2009/6/9
We present the first hierarchical identity based encryption (HIBE) system that has full
security for more than a constant number of levels. In all prior HIBE systems in the literature, the
security ...
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Hierarchical Identity Encryption Constant Size Ciphertext
2009/1/13
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext
consists of just three group elements and decryption requires only two bilinear map computations,regardless of t...
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles
Practical Hierarchical Identity Encryption Signature schemes Random Oracles
2008/12/24
In this paper, we propose a Hierarchical Identity Based Encryption
scheme that is proven secure under the strongest model of [5]
directly, without relying on random oracles. The size of the cipherte...
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
hierarchical identity-based encryption adaptive attacks security against chosen ciphertext attacks
2008/12/24
The current work considers the problem of obtaining a hierarchical identity-based encryption (HIBE) protocol which is secure against adaptive key extraction and decryption queries. Such a protocol is ...
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters
Identity Based Encryption Protocols Short Public Parameters
2008/12/12
At Eurocrypt 2005, Waters proposed an efficient identity based encryption (IBE) scheme. One drawback of this scheme is that the size of the public parameter is rather large. Our first contribution is ...