نتایج جستجو برای: واژگان کلیدی ibe

تعداد نتایج: 50206  

Journal: :The British Journal for the Philosophy of Science 2020

Journal: :Indoor and Built Environment 2012

Journal: :IACR Cryptology ePrint Archive 2017
Philippe Gaborit Adrien Hauteville Duong Hieu Phan Jean-Pierre Tillich

Code-based cryptography has a long history, almost as long as the history of public-key encryption (PKE). While we can construct almost all primitives from codes such as PKE, signature, group signature etc, it is a long standing open problem to construct an identity-based encryption from codes. We solve this problem by relying on codes with rank metric. The concept of identity-based encryption ...

Journal: :IACR Cryptology ePrint Archive 2014
SK Hafizul Islam

This paper designed a new extended chaotic map-based Identity-based encryption (ECM-IBE) scheme and Identitybased digital signature (ECM-IDS) scheme using extended chaotic maps. The security of the ECM-IBE scheme is based on the hardness assumption of chaotic maps-based decisional DiffieHellman (CDDH) problem, whereas the ECM-IDS scheme is secure based on the difficulties of chaotic maps-based ...

Journal: :RFC 2011
Violeta Cakulev Ganapathy S. Sundaram

This document describes a key management protocol variant for the Multimedia Internet KEYing (MIKEY) protocol that relies on a trusted key management service. In particular, this variant utilizes Identity-Based Authenticated Key Exchange (IBAKE) framework that allows the participating clients to perform mutual authentication and derive a session key in an asymmetric Identity-Based Encryption (I...

Journal: :IACR Cryptology ePrint Archive 2004
Brent Waters

We present the first efficient Identity-Based Encryption (IBE) scheme that is fully secure without random oracles. We first present our IBE construction and reduce the security of our scheme to the decisional Bilinear Diffie-Hellman (BDH) problem. Additionally, we show that our techniques can be used to build a new signature scheme that is secure under the computational Diffie-Hellman assumptio...

Journal: :IACR Cryptology ePrint Archive 2006
Paz Morillo Carla Ràfols

We present a certificate-based encryption scheme which is fully secure in the standard model. Our scheme is based on the identity-based encryption scheme of Waters [16]. Although some generic constructions from IBE to CBE has been previously proposed, they use the Random Oracle heuristic or provide less practical schemes than ours. Finally, we point out that one of the existing generic construc...

2009
Ana Saroli

This paper examines differing perceptions of interculturalism in bilingual education in Quechua-speaking communities in the Cusco region of Perú and the relative success of state-run and other intercultural bilingual education (IBE) programs. There is general agreement about the importance of the cultural dimension in these programs. Nevertheless, there is a frequent mismatch between government...

2005
Alexander Bird

The usual, comparative, conception of Inference to the Best Explanation (IBE) takes it to be ampliative. In this paper I propose a conception of IBE (‘Holmesian inference’) that takes it to be a species of eliminative induction and hence not ampliative. This avoids several problems for comparative IBE (e.g. how could it be reliable enough to generate knowledge?). My account of Holmesian inferen...

2015
Dennis Hofheinz Jessica Koch Christoph Striecks

We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many instances of the scheme and many encryptions per instance. In this setting, we reduce the security of our scheme to a variant of a simple assumption used for a similar purpose by Chen and Wee (Crypto 2013). The security loss of our reduction is O(k)...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید