搜索结果: 1-15 共查到“军事学 HIBE”相关记录15条 . 查询时间(0.093 秒)
From Selective IBE to Full IBE and Selective HIBE
public key encryption identity-based encryption Hierarchical Identity-Based-Encryption
font style='font-size:12px;'>
2017/9/30
Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constructions of fully secure IBE and selectively secure hierarchical IBE (HIBE) schemes. Our HIBE scheme a...
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Identity-based Signatures Sequential Aggregate Signatures the CDH Assumption
font style='font-size:12px;'>
2017/4/12
Identity-based sequential aggregate signature (IBSAS) schemes are usually applied to secure network routing and sensor networks, since they allow multiple signers to sequentially produce a short signa...
Dual System Groups and its Applications --- Compact HIBE and More
public-key cryptography prime-order groups
font style='font-size:12px;'>
2016/1/23
We show how to instantiate dual system groups under the decisional subgroup assumption in composite-order groups and the decisional linear assumption (d-LIN) in prime-order groups. Along the way, we p...
(Anonymous) Compact HIBE From Standard Assumptions
constant-size ciphertext HIBE asymmetric pairings
font style='font-size:12px;'>
2014/3/5
We present two hierarchical identity-based encryption (HIBE) schemes, denoted as $\ahibe$ and $\hibe$, from Type-3 pairings with constant sized ciphertexts. Scheme $\ahibe$ is anonymous and $\hibe$ is...
Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption
hierarchical identity-based encryption (HIBE) anonymous HIBE
font style='font-size:12px;'>
2014/3/10
We present the first anonymous hierarchical identity based encryption (HIBE) scheme using Type-3 pairings with adaptive security based on standard assumptions. Previous constructions of anonymous HIBE...
Why Proving HIBE Systems Secure is Difficult
allibishop at gmail com
font style='font-size:12px;'>
2013/4/19
Proving security of Hierarchical Identity-Based Encryption (HIBE) and Attribution Based Encryption scheme is a challenging problem. There are multiple well-known schemes in the literature where the be...
Unbounded HIBE and Attribute-Based Encryption
HIBE Attribute-Based Encryption
font style='font-size:12px;'>
2012/3/29
In this work, we present HIBE and ABE schemes which are ``unbounded" in the sense that the public parameters do not impose additional limitations on the functionality of the systems. In all previous c...
Unbounded HIBE and Attribute-Based Encryption
Unbounded HIBE Attribute-Based Encryption
font style='font-size:12px;'>
2011/2/23
In this work, we present HIBE and ABE schemes which are ``unbounded" in the sense that the public parameters do not impose additional limitations on the functionality of the systems. In all previous c...
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Cryptanalysis Two Efficient HIBE Schemes Standard Model
font style='font-size:12px;'>
2010/4/7
In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity
based encryption scheme based on the q-ABDHE problem with full security in the standard model.
Later in Indocrypt’08,...
Cryptanalysis of an Efficient HIBE Scheme in the Standard Model
Cryptanalysis Efficient HIBE Scheme Standard Model
font style='font-size:12px;'>
2010/3/16
In Informatica 32 (2008), Ren and Gu [11] proposed an anonymous hierarchical identity
based encryption scheme based on the q-ABDHE problem with full security in the standard model.
They also claimed...
Fully Secure HIBE with Short Ciphertexts
Fully Secure HIBE Short Ciphertexts
font style='font-size:12px;'>
2009/10/9
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction
of Boneh, Boyen, and Goh was only proven to be secure in the selective model,
under a non-static assumption ...
Dual System Encryption:Realizing Fully Secure IBE and HIBE under Simple Assumptions
Dual System Encryption Secure IBE HIBE
font style='font-size:12px;'>
2009/8/18
We present a new methodology for proving security of encryption systems using what we call
Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption (IBE)
and Hierarchi...
Generalization of the Selective-ID Security Model for HIBE Protocols
Selective-ID Security Model HIBE Protocols
font style='font-size:12px;'>
2008/11/28
We generalize the selective-ID security model for HIBE by introducing two new security
models. Broadly speaking, both these models allow the adversary to commit to a set of identities and in
the cha...
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
Constant Size Ciphertext HIBE Augmented Selective-ID Model Extensions
font style='font-size:12px;'>
2008/9/10
At Eurocrypt 2005, Boneh, Boyen and Goh presented a constant size ciphertext hierarchical
identity based encryption (HIBE) protocol. Our main contribution is to present a variant of the
BBG-HIBE.
The BBG HIBE Has Limited Delegation
BBG HIBE Limited Delegation
font style='font-size:12px;'>
2008/8/26
At Eurocrypt 2005, Boneh, Boyen, and Goh presented a hierarchical IBE for which they
claimed a novel property, called limited delegation: it is possible to give an entity a private key that restricts...