搜索结果: 1-7 共查到“军事学 Bilinear pairing”相关记录7条 . 查询时间(0.14 秒)
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Proxy signature certificate-based message recovery
font style='font-size:12px;'>
2016/1/26
In this paper, we propose the first provable secure certificate-based proxy signature with message
recovery without bilinear pairing. The notion of certificate-based cryptography was initially
intro...
Breaking a certificateless key agreement protocol withour bilinear pairing
public-key cryptography Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
font style='font-size:12px;'>
2011/6/9
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. Man...
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware
implementation
font style='font-size:12px;'>
2012/3/28
Recently, composite-order bilinear pairing has been shown to be useful in many cryptographic constructions. However, it is time-costly to evaluate. This is because the composite order should be at lea...
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
cryptographic protocols / oblivious transfer mutual authentication ID-based cryptosystem impersonation bilinear pairing
font style='font-size:12px;'>
2012/3/29
As traditional oblivious transfer protocols are treated as cryptographic primitives in most cases, they are usually executed without the consideration of possible attacks, e.g., impersonation, replayi...
Enhanced Privacy ID from Bilinear Pairing
Enhanced Privacy ID Bilinear Pairing
font style='font-size:12px;'>
2009/6/12
Enhanced Privacy ID (EPID) is a cryptographic scheme that enables the remote authenti-
cation of a hardware device while preserving the privacy of the device. EPID can be seen as a
direct anonymous ...
Chameleon Signature from Bilinear Pairing
Digital signatures bilinear pairing chameleon hashing
font style='font-size:12px;'>
2009/4/10
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is tha...
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
timed release encryption bilinear pairing anonymity
font style='font-size:12px;'>
2009/3/27
We consider the problem of sending messages into the future, commonly known as timed
release cryptography. Existing schemes for this task either solve the relative time problem
with uncontrollable, ...