搜索结果: 1-6 共查到“知识库 IBE scheme”相关记录6条 . 查询时间(0.038 秒)
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
DLIN assumption fully secure IBE canceling parameter hiding dual system encryption
2013/4/18
In Eurocrypt 2012, Lewko presented a fully secure IBE scheme in the prime order setting based on the decisional linear assumption. We note that some random factor involved in the ciphertext can furthe...
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
3G Security 3G Security Structure 3G authentication and key agreement protocol Security arith- metic
2013/1/29
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible V...
Simulation without the Artificial Abort:Simplified Proof and Improved Concrete Security for Waters’IBE Scheme
Artificial Abort Simplified Proof Improved Concrete Security Waters’IBE Scheme
2009/6/12
Waters’ variant of the Boneh-Boyen IBE scheme is attractive because of its efficency, appli-
cations, and security attributes, but suffers from a relatively complex proof with poor concrete
security...
An IBE Scheme to Exchange Authenticated Secret Keys
Identity-based cryptosystem pairing bilinear map elliptic curve cryptography
2009/3/25
We present a variant of the Boneh & Franklin Identiybased
Encryption IBE scheme to derive an authenticated symmetric
key-exchange protocol, when combined with a signature
scheme. Our protocol uses ...
From Selective-ID to Full Security:The Case of the Inversion-Based Boneh-Boyen IBE Scheme
Identity-based Encryption full-ID security
2008/9/18
In this note we remark that the inversion-based selective-ID secure identity-based encryption
(IBE) scheme from Boneh and Boyen can be bootstrapped to full-ID security using
a technique by Waters.
REMARKS ON IBE SCHEME OF WANG AND CAO
Public-Key Encryption Identity-Based Encryption (IBE) IND-ID-CCA
2008/5/26
In this paper we analyze and find an anomaly in the security proof of the
identity-based encryption (IBE) scheme fullM-IBE of Wang and Cao [9], which is based
on mBDHP. Here we give another proof fo...