搜索结果: 1-6 共查到“军事学 Encryption Systems”相关记录6条 . 查询时间(0.109 秒)
The Jevil family of encryption systems is a novel set of real-world encryption systems based on the promising foundation of witness encryption. The first Jevil encryption systems comprise of Pentomino...
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memory and consequently de...
Predicate Privacy in Encryption Systems
Predicate Privacy Encryption Systems encryption paradigm
2009/6/11
Predicate encryption is a new encryption paradigm which gives a master secret key owner
fine-grained control over access to encrypted data. The master secret key owner can generate
secret key tokens...
Delegating Capabilities in Predicate Encryption Systems
Delegating Capabilities Predicate Encryption Systems Diffie-Hellman assumption
2009/6/5
In predicate encryption systems, given a capability, one can evaluate one or more predicates on
the encrypted data, while all other information about the plaintext remains hidden. We consider
the fi...
Adaptive Security in Broadcast Encryption Systems
Adaptive Security Broadcast Encryption Systems comparable-size ciphertexts
2009/6/5
We present new techniques for achieving adaptive security in broadcast encryption systems.
Previous work on fully
collusion resistant broadcast encryption with short ciphertexts was limited to consi...
Proxy Re-encryption Systems for Identity-based Encryption
proxy re-encryption system public key encryption identitybased encryption
2008/5/28
A proxy re-encryption system allows the proxy to transform
ciphertexts encrypted under Alice’s public key into the different ciphertexts
that can be decrypted by Bob’s secret key. In this paper, we ...