نتایج جستجو برای: واژگان کلیدی ibe
تعداد نتایج: 50206 فیلتر نتایج به سال:
Code-based cryptography has a long history, almost as long as the history of public-key encryption (PKE). While we can construct almost all primitives from codes such as PKE, signature, group signature etc, it is a long standing open problem to construct an identity-based encryption from codes. We solve this problem by relying on codes with rank metric. The concept of identity-based encryption ...
This paper designed a new extended chaotic map-based Identity-based encryption (ECM-IBE) scheme and Identitybased digital signature (ECM-IDS) scheme using extended chaotic maps. The security of the ECM-IBE scheme is based on the hardness assumption of chaotic maps-based decisional DiffieHellman (CDDH) problem, whereas the ECM-IDS scheme is secure based on the difficulties of chaotic maps-based ...
This document describes a key management protocol variant for the Multimedia Internet KEYing (MIKEY) protocol that relies on a trusted key management service. In particular, this variant utilizes Identity-Based Authenticated Key Exchange (IBAKE) framework that allows the participating clients to perform mutual authentication and derive a session key in an asymmetric Identity-Based Encryption (I...
We present the first efficient Identity-Based Encryption (IBE) scheme that is fully secure without random oracles. We first present our IBE construction and reduce the security of our scheme to the decisional Bilinear Diffie-Hellman (BDH) problem. Additionally, we show that our techniques can be used to build a new signature scheme that is secure under the computational Diffie-Hellman assumptio...
We present a certificate-based encryption scheme which is fully secure in the standard model. Our scheme is based on the identity-based encryption scheme of Waters [16]. Although some generic constructions from IBE to CBE has been previously proposed, they use the Random Oracle heuristic or provide less practical schemes than ours. Finally, we point out that one of the existing generic construc...
This paper examines differing perceptions of interculturalism in bilingual education in Quechua-speaking communities in the Cusco region of Perú and the relative success of state-run and other intercultural bilingual education (IBE) programs. There is general agreement about the importance of the cultural dimension in these programs. Nevertheless, there is a frequent mismatch between government...
The usual, comparative, conception of Inference to the Best Explanation (IBE) takes it to be ampliative. In this paper I propose a conception of IBE (‘Holmesian inference’) that takes it to be a species of eliminative induction and hence not ampliative. This avoids several problems for comparative IBE (e.g. how could it be reliable enough to generate knowledge?). My account of Holmesian inferen...
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many instances of the scheme and many encryptions per instance. In this setting, we reduce the security of our scheme to a variant of a simple assumption used for a similar purpose by Chen and Wee (Crypto 2013). The security loss of our reduction is O(k)...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید