搜索结果: 1-5 共查到“军事学 secure public key encryption scheme”相关记录5条 . 查询时间(0.203 秒)
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Department of Computer Engineering,University of Peradeniya
font style='font-size:12px;'>
2016/1/26
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simpl...
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
CCA2 Secure Public Key Encryption Scheme McEliece Assumptions Standard Model
font style='font-size:12px;'>
2009/6/9
We show that a recently proposed construction by Rosen and Segev can be
used for obtaining the first public key encryption scheme based on the McEliece
assumptions which is secure against adaptive c...
A Forward-Secure Public-Key Encryption Scheme
Forward-Secure Public-Key Encryption Scheme
font style='font-size:12px;'>
2009/4/14
A Forward-Secure Public-Key Encryption Scheme
A Forward-Secure Public-Key Encryption Scheme
Bilinear Diffe-Hellman Encryption Binary-tree encryption
font style='font-size:12px;'>
2009/4/9
Cryptographic computations are often carried out on insecure devices for which the threat
of key exposure represents a serious and realistic concern. In an eort to mitigate the damage
caused by exp...
A new paradigm of chosen ciphertext secure public key encryption scheme
PKE KEM IND-CCA2
font style='font-size:12px;'>
2008/8/21
For all current adaptive chosen ciphertext(CCA) secure public key encryption schemes in standard model there are two operations in the decryption algorithm, “validity check” and decryption.