نتایج جستجو برای: واژگان کلیدی: IBE

تعداد نتایج: 50206  

Journal: : 2022

هدف: هدف پژوهش برجسته کردن مفهوم رفتار انحرافی سازمانی از طریق بررسی مطالعات پیشین و درک پویایی این رفتارها ارائه تصویری جامع روند فراهم آوردن بینشی ارزشمند وضعیت رفتارهای در ایران کمک به هدایت پژوهش­‌های آتی راستای پوشش شکاف­‌های تحقیقاتی موجود حوزه است.روش: با استفاده روش فراترکیب، یافته­‌های پژوهش­های کیفی کمی مرتبط ترکیب الگوی نهایی طراحی شد. بر اساس، 90 سازمانی، اهداف مطالعه حاضر هفت مرحله...

2006
D. PAULY

A brief review is given of Ibe interrelationships and implications of Ibe findings reported in Ibe contributions included in this volume. Emphasis is given to some questions Ibat now appear crucial, e.g. Ibe cannibalization of anchoveu eggs and biannual cycles in anchoveta recruitment and their possible cause(s). Some suggestions are made for future research on various elements of Ibe Peruvian ...

Journal: :IACR Cryptology ePrint Archive 2008
Xu An Wang Xiaoyuan Yang Fagen Li

In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Id...

Journal: :IEICE Transactions 2006
Ryo Nishimaki Yoshifumi Manabe Tatsuaki Okamoto

The identity-based encryption (IBE) is one of the most important primitives in cryptography, and various security notions of IBE (e.g., IND-ID-CCA2, NM-ID-CCA2, IND-sID-CPA etc.) have been introduced and the relations among them have been clarified recently. This paper, for the first time, investigate the security of IBE in the universally composable (UC) framework. This paper first defines the...

Journal: :Comput. J. 2015
Junqing Gong Xiaolei Dong Zhenfu Cao Jie Chen

The paper presented an identity based encryption (IBE) under selective opening attack (SOA) whose security is almost-tightly related to a set of computational assumptions. Our result is a combination of Bellare, Waters, and Yilek’s method [TCC, 2011] for constructing (not tightly) SOA secure IBE and Hofheinz, Koch, and Striecks’ technique [PKC, 2015] on building almost-tightly secure IBE in the...

2017
Göran Pulkkis Kaj Grahn Jonny Karlsson

Identity Based Encryption (IBE) is a public key cryptosystem where a unique identity string, such as an e-mail address, can be used as a public key. IBE is simpler than the traditional PKI since certificates are not needed. An IBE scheme is usually based on pairing of discrete points on elliptic curves. An IBE scheme can also be based on quadratic residuosity. This paper presents an overview of...

Journal: :IACR Cryptology ePrint Archive 2008
Liming Fang Jinyue Xia

At EUROCRYPT 2005, Sahai and Waters presented the Fuzzy Identity Based Encryption (Fuzzy-IBE) which could be used for biometrics and attribute-based encryption in the selective-identity model. When a secure Fuzzy-IBE scheme in the selective-identity model is transformed to full identity model it exist an exponential loss of security. In this paper, we use the CPA secure Gentry's IBE (exponent i...

Journal: :Synthese 2009
Jonathan Weisberg

Inference to the Best Explanation (IBE) and Bayesianism are our two most prominent theories of scientific inference. Are they compatible? Van Fraassen famously argued that they are not, concluding that IBE must be wrong since Bayesianism is right. Writers since then, from both the Bayesian and explanationist camps, have usually considered van Fraassen’s argument to be misguided, and have plumpe...

2010
Neyire Deniz Sarier

In this paper, we present a novel framework for the generic construction of biometric Identity Based Encryption (IBE) schemes, which do not require bilinear pairings and result in more efficient schemes than existing fuzzy IBE systems implemented for biometric identities. Also, we analyze the security properties that are specific to biometric IBE namely anonymity and identity privacy. Consideri...

Journal: :IACR Cryptology ePrint Archive 2005
Nuttapong Attrapadung Yang Cui David Galindo Goichiro Hanaoka Ichiro Hasuo Hideki Imai Kanta Matsuura Peng Yang Rui Zhang

This paper shows that the standard security notion for identity based encryption schemes (IBE), that is IND-ID-CCA2, captures the essence of security for all IBE schemes. To achieve this intention, we first describe formal definitions of the notions of security for IBE , and then present the relations among OW, IND, SS and NM in IBE , along with rigorous proofs. With the aim of comprehensivenes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید