搜索结果: 1-6 共查到“军事学 private keys”相关记录6条 . 查询时间(0.062 秒)
Attack on Kayawood Protocol: Uncloaking Private Keys
Kayawood protocol group-based cryptography key agreement
2018/6/19
We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel, D. Atkins, D. Goldfeld, and P. Gunnels, called Kayawood protocol. At the core of the protocol is an...
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys
Identity-based encryption Hierarchical identity-based encryption Key revocation
2016/5/17
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that supports the
revocation of user’s private keys to manage the dynamic credentials of users in a system. Many diffe...
NEW DIGITAL SIGNATURE SCHEME USING MULTIPLE PRIVATE KEYS OVER NON-COMMUTATIVE DIVISION SEMIRINGS
Digital Signature Factorization theorem
2014/3/6
In this paper, we propose a new signature scheme connecting two private keys and two public keys based on general non-commutative division semiring. The key idea of our technique engrosses three core ...
Reconstructing RSA Private Keys from Random Key Bits
RSA Private Keys Random Key Bits attacks of Halderman
2009/6/10
We show that an RSA private key with small public exponent can be efficiently recovered
given a 0.27 fraction of its bits at random. An important application of this work is to the
"cold boot" attac...
In this work, we design a new public key broadcast encryption system, and we focus on a
critical parameter of device key size: the amount of the cryptographic key material that must
be stored secure...
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Broadcast Encryption Short Ciphertexts Private Keys
2009/1/13
We describe two new public key broadcast encryption systems for stateless receivers. Both
systems are fully secure against any number of colluders. In our first construction both ciphertexts and priv...