军事学 >>> 军事学
搜索结果: 1-8 共查到军事学 ID-Based Encryption相关记录8条 . 查询时间(0.075 秒)
At ACISP 2017, Wu et al. presented an identity-based encryption with equality test (IBEET) that considers to prevent insider attacks. To analyze its security, they proposed a new security notion for I...
The existing identity-based encryption (IBE) schemes based on pairings require pairing computations in encryption or decryption algorithm and it is a burden to each entity which has restricted computi...
In 2006, Boyen and Waters proposed an anonymous ID-based encryp- tion. It is impressive that in the scheme the system secret key is a tuple of five numbers. The user's secret key is also a tuple of ...
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity-based Encryption ...
We discuss the relationship between ID-based key agree- ment protocols, certificateless encryption and ID-based key encapsula- tion mechanisms. In particular we show how in some sense ID-based key ...
vA forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time. Forward security has several unique requirements in hierarchical identity-based encryption (HIB...
ID-based encryption allows for a sender to encrypt a message to an identity without access to a public key certificate. Based on the bilinear pairing, Boneh and Franklin proposed the first practical...
This paper deals with generic transformations from ID-based key encapsulation mech- anisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until now is by Boneh ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...