نتایج جستجو برای: واژگان کلیدی ibe
تعداد نتایج: 50206 فیلتر نتایج به سال:
The Signal Protocol is one of the most popular privacy protocols today for protecting Internet chats and supports end-to-end encryption. Nevertheless, despite its many advantages, not resistant to Man-In-The-Middle (MITM) attacks because a malicious server can distribute forged identity-based public keys during user registration phase. To address this problem, we proposed IBE-Signal scheme that...
واژهها همواره در بافتهای کاربردی خود، با یکدیگر ترکیب شده و عبارتهای مختلفی میسازند؛ این ترکیب و ارتباط، در هیچ زبانی، تصادفی و بدون قاعده نیست و روابط معناداری میان واحدهای هر زبان حاکم است. در قرآن کریم نیز، کاربرد هر واژه در آیات، حکیمانه و هدفمند است و با کنکاش و بررسی ارتباط واژهها با یکدیگر، میتوان مفهوم هر واژه را در ارتباط با دیگر واژگان و در یک نظام معنایی تعیین نمود. تحقیق حاضر...
Revocable identity-based encryption (RIBE) is an extension of (IBE) and it supports efficient revocation private keys. In the past, many RIBE schemes have been proposed, but research on efficiently delegating generation update keys to a cloud server somewhat insufficient. this paper, we newly introduce concept delegated (DRIBE) that can delegate semi-trusted define security models DRIBE. Next, ...
Vishal Saraswat (CRRao AIMSCS) Searchable Encryption APHRDI, 22/09/16 10 / 46 Vishal Saraswat Some other projects Abstract Public-key encryption with keyword search (PEKS) schemes are useful to delegate searching capabilities on encrypted data to a third party, who does not hold the entire secret key, but only an appropriate token which allows searching operations but preserves data privacy. PE...
In Eurocrypt 2012, Lewko presented a fully secure IBE scheme in the prime order setting based on the decisional linear assumption. We note that some random factor involved in the ciphertext can further be used to hide yet another message , and get a new fully secure IBE scheme with better message-ciphertext rate. Similar to Lewko’s scheme, we use dual pairing vector space in prime order bilinea...
The construction of a feed-forward controller frequently requires the estimation of an inverse function. Two possible methods to achieve this are: (i) learning the best estimated inverse (BEI), a method that is sometimes referred to as direct inverse learning and (ii) learning the inverse of the best estimator (IBE), a method that is sometimes referred to as indirect inverse learning. We analyz...
The following essay was written by a sophomore undergraduate student majoring in Bioengineering at the University of Maryland, Mr. Zachary Russ. Mr. Russ was one of 174 students who submitted a 1000-1200 word essay to the 4th Annual Bioethics Contest sponsored by the Institute of Biological Engineering (IBE). A group of professionals in Biological Engineering assessed and ranked the essays in a...
We construct identity-based encryption (IBE) and inner product encryption (IPE) schemes under the decision linear (DLIN) or symmetric external Diffie-Hellman (SXDH) assumptions. Their private user keys are leakage-resilient in several scenarios. In particular, • In the bounded memory leakage model (Akavia et al., TCC ’09), our basic schemes reach the maximum-possible leakage rate 1− o(1). • In ...
In 1984, Shamir[8] first gave the concept of Identity-Based Encryption (IBE). In an IBE scheme, when Alice sends an email to Bob, Alice will use Bob’s email address, [email protected] for example, to encrypt it, without needing to get Bob’s public key certificate before sending it. When Bob receives an email, he first authenticates himself to the Private Key Generator (PKG) and gets his private key. ...
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with curr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید