搜索结果: 1-15 共查到“工学 encryption”相关记录29条 . 查询时间(0.16 秒)
Stretchable and self-healable double-network ionogel with strong adhesion and temperature tolerance for information encryption
Ionic liquids Ionogel Double network Fluorescence Information encryption
font style='font-size:12px;'>
2023/11/30
Recently, hydrogels with adjustable mechanical properties have been developed for information security applications. However, the defects such as easy drying and inferior resistance to extreme tempera...
Using of tiny encryption algorithm in CAN-Bus communication
Tiny algorithm encryption CAN-Bus implement cipher
font style='font-size:12px;'>
2016/7/6
The rising costs of agriculture machine operation force manufacturers to look for solutions that simplify the machine operation to its users and increase user comfort. However, this trend requires far...
The beginning of the end for encryption schemes?
the end encryption schemes
font style='font-size:12px;'>
2016/3/14
What are the prime factors, or multipliers, for the number 15? Most grade school students know the answer — 3 and 5 — by memory. A larger number, such as 91, may take some pen and paper. An even large...
Tight security bounds for Multiple Encryption
Tight security bounds for Multiple Encryption
font style='font-size:12px;'>
2016/1/22
Multiple encryption—the practice of composing a blockcipher several times with itself under independent keys—has received considerable attention of late from the standpoint of provable security.Despit...
Public key encryption with keyword search
keyword search key encryption
font style='font-size:12px;'>
2015/8/5
Identity based encryption from the Weil pairing
Weil pairing Identity based encryption
font style='font-size:12px;'>
2015/8/5
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffi...
Chosen-Ciphertext Security from Identity-Based Encryption
Identity-Based Encryption Chosen-Ciphertext Security
font style='font-size:12px;'>
2015/8/5
We propose simple and efficient "CCA-secure" public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. When i...
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Resistant Broadcast Encryption Short Ciphertexts
font style='font-size:12px;'>
2015/8/5
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both ciphertexts and priva...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
font style='font-size:12px;'>
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
Secure Identity Based Encryption Without Random Oracles
Random Oracles Based Encryption
font style='font-size:12px;'>
2015/8/5
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. T...
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Constant Size Ciphertext Based Encryption
font style='font-size:12px;'>
2015/8/5
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, independent of ...
Efficient Selective Identity-Based Encryption Without Random Oracles
Random Oracles Identity-Based Encryption
font style='font-size:12px;'>
2015/8/5
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model Selective identity secure IBE is a slightly weaker security model ...
Circular-Secure Encryption from Decision Diffie-Hellman
Decision Diffie-Hellman Circular-Secure Encryption
font style='font-size:12px;'>
2015/8/5
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a ``key cycle'' usage, where we ha...
Space-Efficient Identity Based Encryption Without Pairings
Pairings Encryption
font style='font-size:12px;'>
2015/8/5
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on the...
Functional encryption: definitions and challenges
definitions challenges
font style='font-size:12px;'>
2015/8/5
We initiate the formal study of functional encryption by giving precise definitions of the concept and its security. Roughly speaking, functional encryption supports restricted secret keys that enable...