军事学 >>> 军事学 >>> 军事理论 军事史 军事心理学 战略学 战役学 战术学 军队指挥学 军制学 军队政治工作学 军事后勤学 军事地学 军事技术 军事学其他学科 军事学其他学科
搜索结果: 1-9 共查到军事学 Without Pairings相关记录9条 . 查询时间(0.084 秒)
Efficient Group Signature Scheme without Pairings     group signature  EDL signature  pairings       font style='font-size:12px;'> 2018/11/13
Group signature is a useful cryptographic primitive, which makes every group member sign messages on behalf of a group they belong to. Namely group signature allows that group member anonymously signs...
We present new constructions of multi-input functional encryption (MIFE) schemes for the inner-product functionality that improve the state of the art solution of Abdalla et al. (Eurocrypt 2017) in tw...
Hidden vector encryption (HVE), introduced by Boneh and Waters in TCC'07, is an expressive sub-class of predicate encryption, that allows conjunctive, subset, range and comparison queries over encrypt...
Tightly Secure CCA-Secure Encryption without Pairings     public-key encryption  CCA security  tightness       font style='font-size:12px;'> 2016/2/23
We present the first CCA-secure public-key encryption scheme based on DDH where the security loss is independent of the number of challenge ciphertexts and the number of decryption queries. Our cons...
CCA-Secure Proxy Re-Encryption without Pairings     Unidirectional PRE  DDH  random oracle  CCA security       font style='font-size:12px;'> 2009/6/12
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext....
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an en- cryption of the same message intend...
In this paper, we propose two new certificate-based signa- ture (CBS) schemes with new features and advantages. The first one is very ecient as it does not require any pairing computation and its ...
Efficient ID-based Threshold Signature Schemes without Pairings     ID-based Threshold  Signature Schemes  Pairings       font style='font-size:12px;'> 2008/12/17
The focus of this paper is to design an efficient and secure so- lution addressing the key escrow problem in ID-based signature schemes, i.e., the Private Key Generator (PKG) knows the user's priva...
Space-Efficient Identity Based Encryption Without Pairings     Space-Efficient  Identity  Based Encryption  Pairings       font style='font-size:12px;'> 2008/8/28
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on t...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...