搜索结果: 1-6 共查到“军事学 PKG”相关记录6条 . 查询时间(0.062 秒)
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks
Provable Security Random Oracle Model eCK model
font style='font-size:12px;'>
2015/12/22
In this paper we propose an efficient single-round, two-party
identity based authenticated key agreement protocol in the setting of
multiple Private Key Generators (PKGs). One of the major advantage...
On the Role of PKG for Proxy Re-encryption in Identity Based Setting
PKG Proxy Re-encryption Identity Based Setting
font style='font-size:12px;'>
2009/6/9
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called
proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under
Alice’s publi...
Multi-PKG ID based signcryption
signcryption identity based cryptography bilinear pairings
font style='font-size:12px;'>
2009/6/2
Here we propose an identity based signcryption scheme in the multi-PKG environment where sender and receiver receive public key from different PKG. We also define security models for our scheme and gi...
Practical Identity-Based Encryption (IBE) in Multiple-PKG Environments and Its Applications
identity-based encryption (IBE) multiple-PKG environments public key encryption (PKE) escrowed ElGamal
font style='font-size:12px;'>
2008/9/9
Identity-based encryption (IBE) schemes are usually used in multiple-
PKG environments on the one hand, each administrative domain (e.g., a
relatively small and close organization) maintains its own...
Efficient ID-based Signature Without Trusted PKG
ID-based Signature Key Escrow Bilinear Pairing Dishonest PKG Education, Xidian University State Key Laboratory of Integrated Service Networks, Xidian University
font style='font-size:12px;'>
2008/9/3
In this paper, we introduce the exact concept of ID-based
signature without trusted Private Key Generater(PKG), which solves
the key escrow problem through binding two public key with a same
identi...
Reducing Trust in the PKG in Identity Based Cryptosystems
Reducing Trust PKG Identity Based Cryptosystems
font style='font-size:12px;'>
2008/5/28
One day, you suddenly find that a private key corresponding to your Identity is up for sale at
e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is acting
dishonestly ...