搜索结果: 1-15 共查到“计算机科学技术 identity”相关记录15条 . 查询时间(0.119 秒)
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffi...
Chosen-Ciphertext Security from Identity-Based Encryption
Identity-Based Encryption Chosen-Ciphertext Security
2015/8/5
We propose simple and efficient "CCA-secure" public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. When i...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. T...
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Constant Size Ciphertext Based Encryption
2015/8/5
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, independent of ...
Efficient Selective Identity-Based Encryption Without Random Oracles
Random Oracles Identity-Based Encryption
2015/8/5
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model Selective identity secure IBE is a slightly weaker security model ...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on the...
Hybrid Radio Frequency and Video Framework for Identity-Aware Augmented Perception in Disaster Management and Assistive Technologies
augmented perception hybrid identification radio frequency tracking video
2014/11/7
In this dissertation, we introduce a hybrid radio frequency and video framework that enables identity aware-augmented perception. Identity-aware augmented perception enhances users' perception of the ...
A Privacy Preserving Attribute Aggregation Model for Federated Identity Managements
A Privacy Preserving Attribute Aggregation Model Federated Identity Managements
2010/9/25
In order to support attribute based access control (ABAC) infederated identity management most existing solutions, such asShibboleth and Cardspace, utilise a model in which a single identityprovider (...
SWIFT: Advanced Services for Identity Management
SWIFT Advanced Services Identity Management
2010/9/25
Traditional solutions for identity management, based on the end userauthentication, usually by means of credentials such as username andpassword, have significantly improved in recent years with thein...
BEA and computer associationes Announce Strategic Partnership for Identity and Access Management
IAM technology Marketing programs
2007/3/9
CA Announces New Release of eTrust SiteMinder with Enhanced Identity Federation Capabilities
Identity federation Access Management
2006/12/25
CA Extends Leadership in Identity and Access Management with New Release of IAM Solution
Access Management
2006/12/25
computer associationes Extends Leadership in Identity and Access Management with New Release of IAM Solution
IT operations IAM capabilities
2006/12/6
Identity-Based Parallel Key-Insulated Signature: Framework and Construction
Parallel Key-Insulated Identity-Based Signature Key-Exposure Bilinear Pairings
2014/3/11
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) proposed an ID-based key-insulated signature (IBKIS) scheme. However, their scheme is not strong key...