Analysis of bilinear pairing-based accumulator for identity escrowing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of bilinear pairing-based accumulator for identity escrowing

An accumulator based on bilinear pairings was proposed at CT-RSA’05. In this paper, we first demonstrate that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator which is not collision resistant. Second we show that we can provide collision-resistance by updating the adversary model appropriately. Finally, we propose an improvement on Nguyen’s identity escrow sche...

متن کامل

An Identity-based Mediated Signature Scheme from Bilinear Pairing

It has always been a critical issue to find efficient methods for fast revocation of a user’s identity in identity (ID)based cryptosystems. Unfortunately, none of the previous ID-based cryptography can find a practical way. Libert et al. and Baek et al. respectively propose an ID-based mediated encryption scheme based on the practical ID-based encryption scheme from bilinear pairing due to Bone...

متن کامل

The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant

In this paper, we demonstrate that the construction proposed by Lan Nguyen at CT-RSA’05 does lead to a cryptographic accumulator which is not collision resistant.

متن کامل

woman-defined identity: analysis of selected poems of adrienne rich

the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...

Chameleon Signature from Bilinear Pairing

Xinjun Du, Ying Wang, Jianhua Ge and Yumin Wang Key Laboratory of Computer Networks and Information Security Xidian University Abstract: Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that there are non-transferable, with only the designated recip...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IET Information Security

سال: 2008

ISSN: 1751-8709

DOI: 10.1049/iet-ifs:20070091