نتایج جستجو برای: واژگان کلیدی ibe

تعداد نتایج: 50206  

Journal: :Synthese 2007
David H. Glass

This paper considers an application of work on probabilistic measures of coherence to inference to the best explanation (IBE). Rather than considering information reported from different sources, as is usually the case when discussing coherence measures, the approach adopted here is to use a coherence measure to rank competing explanations in terms of their coherence with a piece of evidence. B...

2006
Peng Yang Takashi Kitagawa Goichiro Hanaoka Rui Zhang Kanta Matsuura Hideki Imai

The Fujisaki-Okamoto (FO) conversion is widely known to be able to generically convert a weak public key encryption scheme, say one-way against chosen plaintext attacks (OW-CPA), to a strong one, namely, indistinguishable against adaptive chosen ciphertext attacks (IND-CCA). It is not known that if the same holds for identity-based encryption (IBE) schemes, though many IBE and variant schemes a...

2014
Michael Clear Hitesh Tewari Ciaran McGoldrick

Identity Based Encryption (IBE) has been constructed from bilinear pairings, lattices and quadratic residuosity. The latter is an attractive basis for an IBE owing to the fact that it is a well-understood hard problem from number theory. Cocks constructed the first such scheme, and subsequent improvements have been made to achieve anonymity and improve space efficiency. However, the anonymous v...

2005
Benoît Libert Jean-Jacques Quisquater

This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Franklin IBE is an hybrid construction that is proved to be secure (using proof techniques borrowed from those for KEM-DEM constructions) in the random oracle model under a slightly stronger assumption than the original IBE ...

Journal: :I. J. Network Security 2012
Miaomiao Tian Wei Yang Liusheng Huang

Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w′ can be decrypted using a secret key corresponding to the identity w which is close to w′ as measured by some metric. Recently, Yang et al. proposed a constant-size Bio-IBE scheme and proved that it is secure against adaptive chosen-ciphertext a...

Journal: :International Journal of Engineering & Technology 2018

Journal: :Journal of cell science 2005
Shigeru Kanda Yasushi Mochizuki Takao Nakamura Yasuyoshi Miyata Toshifumi Matsuyama Hiroshi Kanetake

Pigment epithelium-derived factor (PEDF) exerts anti-angiogenic actions. However, the signal-transduction pathways regulated by PEDF remain to be elucidated. We show here that PEDF inhibited fibroblast growth factor 2 (FGF-2) induced capillary morphogenesis of a murine brain capillary endothelial cell line (IBE cells) and of human umbilical-vein endothelial cells (HUVECs) cultured on growth-fac...

Journal: :ICST Trans. Security Safety 2015
Ibrahim F. Elashry Yi Mu Willy Susilo

Boneh, Ding and Tsudik presented identity-based mediated RSA encryption and signature systems in which the users are not allowed to decrypt/sign messages without the authorisation of a security mediator.We show that ID-MRSA is not secure and we present a secure modified version of it which is as efficient as the original system. We also propose a generic mediated encryption that translates any ...

2008
Man Ho Au Qiong Huang Joseph K. Liu Willy Susilo Duncan S. Wong Guomin Yang

Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2...

2010
David Gray Caroline Sheedy

We present a novel approach to e-voting for elections, based on a new cryptographic construction, double-blind identity based encryption (IBE). In standard IBE, the identity string that is passed to a key generation centre (KGC) during the key extraction phase is visible to the KGC. Recent work introduced the notion of blinding the identity string, resulting in a private key generation protocol...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید