نتایج جستجو برای: واژگان کلیدی ibe

تعداد نتایج: 50206  

Journal: :IACR Cryptology ePrint Archive 2017
Chun-I Fan Yi-Fan Tseng Chih-Wen Lin

Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides. If the attributes of the receivers match the access policy, then they can decrypt the ciphertext. This manuscript shows a relation between ABE and identity-based en...

Journal: :IACR Cryptology ePrint Archive 2011
Rkia Aouinatou Mostafa Belkasmi

In this article we show how we can integrate the RSA (RSA-OAEP) into the IBE. Our prove can be make with either Standard Model or Random Oracle. We firstly develop the basic ideas made in this direction, so that to create a novel scheme with which we can signs and crypt at the same time. Then we give our new approach which conserves properly the syntax of the RSA classic. Additionally we compar...

Journal: :IACR Cryptology ePrint Archive 2002
Jae Choon Cha Jung Hee Cheon

In this paper we propose an identity(ID)-based signature scheme using gap Diffie-Hellman (GDH) groups. Our scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. Using GDH groups obtained from bilinear pairings, as a special case of our scheme, we obtain an ID-based signature scheme that shares the same system parameters wit...

Journal: :Applied Physics Letters 2023

Artificial tailoring of magnetic anisotropy by manipulating interfacial morphology and film structure is fundamental interest from an application point view in spintronic memory devices. This Letter reports approach to engineer enhance the strength oblique incidence ion beam erosion (IBE)-induced in-plane uniaxial (UMA) simultaneous modification texture. Cobalt Si substrate have been taken as a...

Journal: :IACR Cryptology ePrint Archive 2015
Dipanjan Das Priyanka Bose S. Sree Vivek S. Sharmila Deva Selvi C. Pandu Rangan

Modern software ecosystem is data-centric. Data exfiltration due to the attacks of Memory Scraper type malwares is an emerging threat. In this paper, we set up an appropriate mathematical model capturing the threat such attacks pose to Identity Based Cryptosystems (IBE). Following the formalism, we demonstrate an attack on popular Boneh-Franklin CCA2 secure IBE construction that compels us to r...

Journal: :IACR Cryptology ePrint Archive 2010
Angelo De Caro Vincenzo Iovino Giuseppe Persiano

Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the security of our scheme under static (and generically secure) assumptions formulated in composite order bilinear groups. In addition, we present a fully secure Anonymous IBE in the secret-key setting. Secret-Key Anonymou...

2007
Ayşe Gül Erkay Savaş

Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended to propose an IBE infrastructure for messaging applications. The proposed infrastructure requires one registration authority and at least one p...

Journal: :IACR Cryptology ePrint Archive 2012
Mihir Bellare Kenneth G. Paterson Susan Thomson

We provide a framework enabling the construction of IBE schemes that are secure under related-key attacks (RKAs). Specific instantiations of the framework yield RKA-secure IBE schemes for sets of related key derivation functions that are non-linear, thus overcoming a current barrier in RKA security. In particular, we obtain IBE schemes that are RKA secure for sets consisting of all affine funct...

Journal: :Problemata 2022

É comum encontrar, na literatura de Filosofia da Ciência, a abdução, ou raciocínio abdutivo, Charles S. Peirce como sinônima inferência melhor explicação (IBE – inference to the best explanation) Gilbert Harman. Todavia, embora seja frequente essa identificação, alguns autores sugeriram que isso um equívoco causado pela má contextualização do conceito abdução filosofia peirciana. O presente art...

2009
Brent Waters

We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption (IBE) and Hierarchical Identity-Based Encryption (HIBE) systems under the simple and established decisional Bilinear Diffie-Hellman and decisional Linear assumptions. Our IBE system has ciphertexts, private keys, and p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید