نتایج جستجو برای: واژگان کلیدی ibe

تعداد نتایج: 50206  

Journal: :Journal of Physics: Conference Series 2021

Journal: :IJACT 2013
Sanjit Chatterjee Palash Sarkar

At Eurocrypt 2005, Waters proposed an efficient identity-based encryption (IBE) scheme and its extension to a hierarchical IBE (HIBE). We describe a (H)IBE scheme which improves upon Waters scheme by significantly reducing the size of the public parameters. The reduction is based on two ideas. The first idea involves partitioning n-bit identities into l-bit blocks while the second idea involves...

Journal: :European Journal of Archaeology 2021

The last decades have seen a renewed interest in the study of argumentation archaeology, particularly response to overproduction weak and unreliable interpretations explanations. Concurrently, recent appeals for scientific transparency efficiency management archaeological information digital form stressed necessity explicitly showing processes followed. A growing body literature has identified ...

Journal: :Physiological and biochemical zoology : PBZ 2013
Kirsten Gallagher James F Staples

During bouts of torpor, mitochondrial metabolism is known to be suppressed in the liver and skeletal muscle of hibernating mammals. This suppression is rapidly reversed during interbout euthermic (IBE) phases, when whole-animal metabolic rate and body temperature (T(b)) return spontaneously to euthermic levels. Such mitochondrial suppression may contribute significantly to energy savings, but t...

2016
Britta Hale Christopher Carr Danilo Gligoroski

Mass surveillance and a lack of end-user encryption, coupled with a growing demand for key escrow under legal oversight and certificate authority security concerns, raise the question of the appropriateness of continued general dependency on PKI. Under this context, we examine Identity-Based Encryption (IBE) as an alternative to publickey encryption. Cascade encryption, or sequential multiple e...

2014
Felix Günther Mark Manulis Andreas Peter

Participatory sensing enables new paradigms and markets for information collection based on the ubiquitous availability of smartphones, but also introduces privacy challenges for participating users and their data. In this work, we review existing security models for privacy-preserving participatory sensing and propose several improvements that are both of theoretical and practical significance...

2007
Matthew Green Susan Hohenberger

In an identity-based encryption (IBE) scheme, there is a key extraction protocol where a user submits an identity string to a master authority who then returns the corresponding secret key for that identity. In this work, we describe how this protocol can be performed efficiently and in a blind fashion for several known IBE schemes; that is, a user can obtain a secret key for an identity withou...

Journal: :IACR Cryptology ePrint Archive 2014
Kwangsu Lee Dong Hoon Lee Jong Hwan Park

Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important since a user’s credential (or private key) can be expired or revealed. Revocable IBE (RIBE) is an extension of IBE that provides an efficient revocation mechanism. Previous RIBE schemes essentially use the complete subtree (CS) scheme for key revocation. In this paper, we present a new technique fo...

2006
Carlo Laj Catherine Kissel Andrew P. Roberts

[1] We present four new records of the Iceland Basin Excursion (IBE) and five new records of the Laschamp Excursion (LE) obtained from rapidly deposited marine sediments in the North Atlantic Ocean, the Nordic Seas, the Gulf of Mexico, the South China Sea, and the southern Indian Ocean. Marked minima in relative paleointensity correspond with the paleomagnetic directional changes associated wit...

2012
Jacob Alperin-Sheriff Chris Peikert

We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (IBE). Circular/KDM security requires that ciphertexts preserve secrecy even when they encrypt messages that may depend on the secret keys, and arises in natural usage scenarios for IBE. We construct an IBE system that is circul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید