搜索结果: 1-6 共查到“Secure IBE”相关记录6条 . 查询时间(0.078 秒)
Tightly Secure IBE under Constant-size Master Public Key
Identity-based encryption tight reduction
2016/12/9
This paper proposes an IBE scheme with tight security reduction and constant-size master public key. This (partially) solves the first open problem posed by Chen and Wee [CRYPTO, 2013]. Concretely, th...
Fully, (Almost) Tightly Secure IBE from Standard Assumptions
Identity-based encryption tight security proofs
2014/3/5
We present the first fully secure Identity-Based Encryption scheme (IBE) from the standard assumptions where the security loss depends only on the security parameter and is independent of the number o...
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
DLIN assumption fully secure IBE canceling parameter hiding dual system encryption
2013/4/18
In Eurocrypt 2012, Lewko presented a fully secure IBE scheme in the prime order setting based on the decisional linear assumption. We note that some random factor involved in the ciphertext can furthe...
Dual System Encryption:Realizing Fully Secure IBE and HIBE under Simple Assumptions
Dual System Encryption Secure IBE HIBE
2009/8/18
We present a new methodology for proving security of encryption systems using what we call
Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption (IBE)
and Hierarchi...
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
3G Security 3G Security Structure 3G authentication and key agreement protocol Security arith- metic
2013/1/29
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible V...
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
Chosen-ciphertext security Identity-Based Encryption Bilinear Maps
2009/6/2
We propose two constructions of chosen-ciphertext secure identity-based encryption (IBE) schemes.
Our schemes have a security proof in the standard model, yet they offer performance competitive
with...