搜索结果: 1-3 共查到“军事学 Identity-based cryptography”相关记录3条 . 查询时间(0.046 秒)
Identity-Based Cryptography for Cloud Security
public-key cryptography / identity-based cryptography
font style='font-size:12px;'>
2012/3/29
Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents a novel Hierarchical Ar...
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
Asynchronous Distributed Private-Key Generators Identity-Based Cryptography IBE scheme
font style='font-size:12px;'>
2009/7/22
Identity-based cryptography can greatly reduce the complexity of sending encrypted messages over the Internet.
However, it necessarily requires a private-key generator (PKG), which can create private...
Multipurpose Identity-Based Signcryption A Swiss Army Knife for Identity-Based Cryptography
Multipurpose Identity-Based Signcryption Swiss Army Knife Identity-Based Cryptography
font style='font-size:12px;'>
2009/4/9
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography
that does not require principals to pre-compute key pairs and obtain certificates for their public
keys—ins...