搜索结果: 1-15 共查到“军事学 IBE”相关记录42条 . 查询时间(0.14 秒)
Additively Homomorphic IBE from Higher Residuosity
Identity-Based Encryption Homomorphic Encryption
2019/1/26
We present an identity-Based encryption (IBE) scheme that is group homomorphic for addition modulo a ``large'' (i.e. superpolynomial) integer, the first such group homomorphic IBE. Our first result is...
Registration-Based Encryption: Removing Private-Key Generator from IBE
identity-based encryption key escrow
2018/11/8
In this work, we introduce the notion of registration-based encryption (RBE for short) with the goal of removing the trust parties need to place in the private-key generator in an IBE scheme. In an RB...
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model
identity-based encryption quantum random oracle models LWE assumption
2018/5/22
In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-based encryption (GPV-IBE) scheme based on a post-quantum assumption, namely, the learning with errors (LWE) assumption...
Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance
RIBE DKER
2018/5/11
Revocable identity-based encryption (RIBE) is an extension of IBE that supports a key revocation mechanism; an indispensable feature for practical cryptographic schemes. Due to this extra feature, RIB...
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions
identity-based encryption anonymity leakage resilience
2017/10/9
In anonymous identity-based encryption (IBE), ciphertexts not only hide their corresponding messages, but also their target identity. We construct an anonymous IBE scheme based on the Computational Di...
From Selective IBE to Full IBE and Selective HIBE
public key encryption identity-based encryption Hierarchical Identity-Based-Encryption
2017/9/30
Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constructions of fully secure IBE and selectively secure hierarchical IBE (HIBE) schemes. Our HIBE scheme a...
Attribute-Based Group Homomorphic Encryption and Additively Homomorphic IBE
homomorphic encryption ABE IBE
2017/8/8
Group Homomorphic Encryption (GHE), formally defined by Armknecht, Katzenbeisser and Peter, is a public-key encryption primitive where the decryption algorithm is a group homomorphism. Hence it suport...
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs
Physically Unclonable Functions Identity based Encryption Internet of Things
2017/5/23
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs). In traditional authentica...
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
multiparty NIKE (H)IBE broadcast encryption
2017/2/23
We define the concept of an encryptor combiner. Roughly, such a combiner takes as input n public keys for a public key encryption scheme, and produces a new combined public key. Anyone knowing a secre...
The Cocks Identity Based Encryption (IBE) scheme, proposed in 2001 by Clifford Cocks, has been the standard for Quadratic Residue-based IBE. It had been long believed that this IBE did not have enough...
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
Identity based encryption Tight security Nested dual system group
2016/12/9
In 2015, Hofheinz et al. [PKC, 2015] extended Chen and Wee's almost-tight reduction technique for identity based encryptions (IBE) [CRYPTO, 2013] to the multi-instance, multi-ciphertext (MIMC, or mult...
Tightly Secure IBE under Constant-size Master Public Key
Identity-based encryption tight reduction
2016/12/9
This paper proposes an IBE scheme with tight security reduction and constant-size master public key. This (partially) solves the first open problem posed by Chen and Wee [CRYPTO, 2013]. Concretely, th...
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
Revocable identity-based encryption static assumptions asymmetric pairings
2016/12/7
Revoking corrupted users is a desirable functionality for cryptosystems. Since Boldyreva,
Goyal, and Kumar (ACM CCS 2008) proposed a notable result for scalable revocation method in
identity-based e...
Towards Tightly Secure Short Signature and IBE
Tight security pseudorandom functions short signatures
2016/5/23
Constructing short signatures with tight security from standard assumptions is a long-standing open problem. We present an adaptively secure, short (and stateless) signature scheme, featuring a consta...
We construct an identity-based encryption (IBE) scheme from the standard Learning with Errors
(LWE) assumption, which both has a compact public-key (with size similar to known lattice-based PKE
sche...