搜索结果: 1-14 共查到“军事学 Bilinear maps”相关记录14条 . 查询时间(0.062 秒)
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Predicate Encryption Bilinear Maps Probabilistic Rank
font style='font-size:12px;'>
2019/9/19
In predicate encryption for a function ff, an authority can create ciphertexts and secret keys which are associated with `attributes'. A user with decryption key KyKy corresponding to attribute yy can...
Arithmetic Garbling from Bilinear Maps
Arithmetic Garbling Predicate Encryption
font style='font-size:12px;'>
2019/1/29
We consider the problem of garbling arithmetic circuits and present a garbling scheme for inner-product predicates over exponentially large fields. Our construction stems from a generic transformation...
Unbounded Inner Product Functional Encryption from Bilinear Maps
functional encryption inner product function hiding
font style='font-size:12px;'>
2018/7/20
Inner product functional encryption (IPFE), introduced by Abdalla et al. (PKC2015), is a kind of functional encryption supporting only inner product functionality. All previous IPFE schemes are bounde...
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness
Indistinguishability Obfuscation Functional Encryption
font style='font-size:12px;'>
2018/6/25
The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, significantly expanding the scope of problems amenable to cryptographic study. All known approaches to cons...
Garbled Protocols and Two-Round MPC from Bilinear Maps
RAM programs distributed protocol
font style='font-size:12px;'>
2017/10/16
In this paper, we initiate the study of \emph{garbled protocols} --- a generalization of Yao's garbled circuits construction to distributed protocols. More specifically, in a garbled protocol construc...
Indistinguishability Obfuscation from Bilinear Maps and Block-Wise Local PRGs
Indistinguishability Obfuscation Bilinear Maps Block-wise Local PRGs
font style='font-size:12px;'>
2017/3/21
Recent works (Lin, EUROCRYPT'16, ePrint'16; Lin and Vaikunthanathan, FOCS'16; Ananth and Sahai, EUROCRYPT'17) establish a tight connection between constructions of indistinguishability obfuscation fro...
Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
Ring LWE Bilinear Maps Identity-Based Encryption
font style='font-size:12px;'>
2016/12/10
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes. One of the distinguishing property of the schemes is that it achieves shorter public parameters than previous s...
Two-Input Functional Encryption for Inner Products from Bilinear Maps
Functional encryption Multi-input functional encryption Inner product
font style='font-size:12px;'>
2016/5/3
Functional encryption is a new paradigm of public-key encryption that allows a user to compute f(x) on encrypted data CT(x) with a private key SKf to finely control the revealed information. Multi-inp...
Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps
Boolean Circuits Bilinear Maps
font style='font-size:12px;'>
2016/1/8
We propose the first Key-policy Attribute-based Encryption (KP-ABE) scheme
for (monotone) Boolean circuits based on bilinear maps. The construction is based on secret
sharing and just one bilinear m...
More Efficient Secure Outsourcing Methods for Bilinear Maps
Bilinear maps Secure delegation Secure Cloud Computing
font style='font-size:12px;'>
2015/12/22
Bilinear maps are popular cryptographic primitives which have been commonly used in various modern cryptographic protocols. However, the cost of computation for bilinear maps is expensive because of t...
Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps
Certificateless Signcryption scheme Bilinear pairing
font style='font-size:12px;'>
2009/12/29
Signcryption is a cryptographic primitive that fulfills both the functions
of digital signature and public key encryption simultaneously, at a cost significantly
lower than that required by the trad...
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
dynamic accumulators anonymous credentials revocation
font style='font-size:12px;'>
2009/6/11
The success of electronic authentication systems, be it e-
ID card systems or Internet authentication systems such as CardSpace,
highly depends on the provided level of user-privacy. Thereby, an imp...
A New Forward Secure Signature Scheme using Bilinear Maps
New Forward Secure Signature Scheme Bilinear Maps
font style='font-size:12px;'>
2009/4/10
Forward-secure signatures are used to defeat signature forgeries in cases of key
exposure. In this model, the signature key evolves with time and it is
computationally infeasible for an adversary to...
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps
LRSW Assumption Group Signature Verifier-Local Revocation
font style='font-size:12px;'>
2008/12/15
We propose a new computational complexity assumption from bilinear map, based on which we construct Verifier-Local Revocation group signatures with shorter lengths than previous ones.