搜索结果: 1-4 共查到“计算机处理器技术 Identity-Based Encryption”相关记录4条 . 查询时间(0.171 秒)
Chosen-Ciphertext Security from Identity-Based Encryption
Identity-Based Encryption Chosen-Ciphertext Security
2015/8/5
We propose simple and efficient "CCA-secure" public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. When i...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
Efficient Selective Identity-Based Encryption Without Random Oracles
Random Oracles Identity-Based Encryption
2015/8/5
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model Selective identity secure IBE is a slightly weaker security model ...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on the...