搜索结果: 1-11 共查到“军事学 hybrid encryption”相关记录11条 . 查询时间(0.078 秒)
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Cloud Security Storage Protection Access Control, Policies
2019/6/12
Secure cloud storage is considered as one of the most important issues that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some int...
Hybrid Encryption in a Multi-User Setting, Revisited
hybrid encryption multi-user security tightness
2017/9/7
This paper contributes to understanding the interplay of security notions for PKE, KEMs, and DEMs, in settings with multiple users, challenges, and instances. We start analytically by first studying (...
A New Randomness Extraction Paradigm for Hybrid Encryption
Chosen-ciphertext security hybrid encryption randomness extraction
2009/6/5
We present a new approach to the design of IND-CCA2 secure hybrid encryption schemes
in the standard model. Our approach provides an efficient generic transformation from
1-universal to 2-universal ...
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
Uninstantiable Random-Oracle-Model Scheme Hybrid-Encryption Problem
2009/4/8
We present a simple, natural random-oracle (RO) model scheme, for a practical goal, that
is uninstantiable, meaning is proven in the RO model to meet its goal yet admits no standard-
model instantia...
Tag-KEM/DEM: A New Framework for Hybrid Encryption
Hybrid Encryption KEM DEM Chosen Ciphertext Security
2009/1/14
This paper presents a novel framework for the generic construction of hybrid encryption
schemes which produces more efficient schemes than the ones known before. A previous
framework introduced by S...
KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption
KEM DEM Secure Hybrid Encryption
2008/12/10
The KEM/DEM hybrid encryption paradigm combines the efficiency and large message
space of secret key encryption with the advantages of public key cryptography. Due to
its simplicity and °exibility, ...
Authenticated Hybrid Encryption for Multiple Recipients
Public key encryption Authentication Signcryption Multicast
2008/10/23
Authenticated encryption schemes used in order to send one
message to one recipient have received considerable attention in the last
years. We investigate the case of schemes, we call authenticated...
Efficient Hybrid Encryption from ID-Based Encryption
Hybrid Encryption Selective-ID KEM Threshold PKE Chameleon Hash
2008/9/18
This paper deals with generic transformations from ID-based key encapsulation mech-
anisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known
until now is by Boneh ...
Some Results on Anonymity in Hybrid Encryption
Computational Cryptography Public-Key Anonymity Provable Security
2008/9/4
Anonymity(key-privacy) as well as security(data-privacy) are all important features in public-key encryption applications. In this paper two new and general concepts, named “relevant anonymity” and “r...
Secure Hybrid Encryption from Weakened Key Encapsulation
Chosen-ciphertext security weak security assumptions hybrid encryption
2008/8/14
We put forward a new paradigm for building hybrid encryption schemes from constrained
chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated
symmetric encryption. Con...
Weak adaptive chosen ciphertext secure hybrid encryption scheme
hybrid encryption KEM DEM IND-WCCA
2008/5/21
We propose a security notion named as weak adaptive chosen ciphertext security(INDWCCA)
for hybrid encryption schemes. Although it is weaker than adaptive chosen ciphertext security(INDCCA),
a IND-W...