نتایج جستجو برای: واژگان کلیدی ibe
تعداد نتایج: 50206 فیلتر نتایج به سال:
At Eurocrypt 2005, Waters proposed an efficient identity-based encryption (IBE) scheme and its extension to a hierarchical IBE (HIBE). We describe a (H)IBE scheme which improves upon Waters scheme by significantly reducing the size of the public parameters. The reduction is based on two ideas. The first idea involves partitioning n-bit identities into l-bit blocks while the second idea involves...
The last decades have seen a renewed interest in the study of argumentation archaeology, particularly response to overproduction weak and unreliable interpretations explanations. Concurrently, recent appeals for scientific transparency efficiency management archaeological information digital form stressed necessity explicitly showing processes followed. A growing body literature has identified ...
During bouts of torpor, mitochondrial metabolism is known to be suppressed in the liver and skeletal muscle of hibernating mammals. This suppression is rapidly reversed during interbout euthermic (IBE) phases, when whole-animal metabolic rate and body temperature (T(b)) return spontaneously to euthermic levels. Such mitochondrial suppression may contribute significantly to energy savings, but t...
Mass surveillance and a lack of end-user encryption, coupled with a growing demand for key escrow under legal oversight and certificate authority security concerns, raise the question of the appropriateness of continued general dependency on PKI. Under this context, we examine Identity-Based Encryption (IBE) as an alternative to publickey encryption. Cascade encryption, or sequential multiple e...
Participatory sensing enables new paradigms and markets for information collection based on the ubiquitous availability of smartphones, but also introduces privacy challenges for participating users and their data. In this work, we review existing security models for privacy-preserving participatory sensing and propose several improvements that are both of theoretical and practical significance...
In an identity-based encryption (IBE) scheme, there is a key extraction protocol where a user submits an identity string to a master authority who then returns the corresponding secret key for that identity. In this work, we describe how this protocol can be performed efficiently and in a blind fashion for several known IBE schemes; that is, a user can obtain a secret key for an identity withou...
Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important since a user’s credential (or private key) can be expired or revealed. Revocable IBE (RIBE) is an extension of IBE that provides an efficient revocation mechanism. Previous RIBE schemes essentially use the complete subtree (CS) scheme for key revocation. In this paper, we present a new technique fo...
[1] We present four new records of the Iceland Basin Excursion (IBE) and five new records of the Laschamp Excursion (LE) obtained from rapidly deposited marine sediments in the North Atlantic Ocean, the Nordic Seas, the Gulf of Mexico, the South China Sea, and the southern Indian Ocean. Marked minima in relative paleointensity correspond with the paleomagnetic directional changes associated wit...
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (IBE). Circular/KDM security requires that ciphertexts preserve secrecy even when they encrypt messages that may depend on the secret keys, and arises in natural usage scenarios for IBE. We construct an IBE system that is circul...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید