搜索结果: 1-5 共查到“军队指挥学 Identity-Based Encryption Scheme”相关记录5条 . 查询时间(0.193 秒)
On the security of Jhanwar-Barua Identity-Based Encryption Scheme
identity based encryption ibe
2018/5/28
In 2008, Jhanwar and Barua presented an improvement of the Boneh-Gentry-Hamburg (BGH) scheme. In addition to reducing the time complexity of the algorithm to find a solution of the equation ax2+Sy2≡1m...
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
Glassbox Security Model Identity Based Encryption RAM Scraper
2015/12/21
. Modern software ecosystem is data-centric. Data exfiltration due to the attacks
of Memory Scraper type malwares is an emerging threat. In this paper, we set up
an appropriate mathematical model ca...
Breaking An Identity-Based Encryption Scheme based on DHIES
An Identity-Based Encryption Scheme DHIES
2010/12/16
We present collusion attacks against an Identity-based Encryption scheme based on DHIES that was proposed by Chen et al. at ASIACCS 2010. Our attacks recover the master secret key of the scheme, so in...
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Security Proof Sakai-Kasahara's Identity-Based Encryption Scheme
2009/2/18
Identity-based encryption (IBE) is a special asymmetric en-
cryption method where a public encryption key can be an arbitrary iden-
tifier and the corresponding private decryption key is created by ...
SECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME
Public Key Encryption Identity-Based Encryption (IBE) One-Way Encryption (OWE)
2008/5/30
This paper analyzes the security of an IBE scheme proposed by Wang in 2007.
It is shown that under BDHP (which is polynomially time equivalent to BIDHP)
assumption the scheme is secure in random ora...