نتایج جستجو برای: واژگان کلیدی: IBE
تعداد نتایج: 50206 فیلتر نتایج به سال:
هدف: هدف پژوهش برجسته کردن مفهوم رفتار انحرافی سازمانی از طریق بررسی مطالعات پیشین و درک پویایی این رفتارها ارائه تصویری جامع روند فراهم آوردن بینشی ارزشمند وضعیت رفتارهای در ایران کمک به هدایت پژوهشهای آتی راستای پوشش شکافهای تحقیقاتی موجود حوزه است.روش: با استفاده روش فراترکیب، یافتههای پژوهشهای کیفی کمی مرتبط ترکیب الگوی نهایی طراحی شد. بر اساس، 90 سازمانی، اهداف مطالعه حاضر هفت مرحله...
A brief review is given of Ibe interrelationships and implications of Ibe findings reported in Ibe contributions included in this volume. Emphasis is given to some questions Ibat now appear crucial, e.g. Ibe cannibalization of anchoveu eggs and biannual cycles in anchoveta recruitment and their possible cause(s). Some suggestions are made for future research on various elements of Ibe Peruvian ...
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Id...
The identity-based encryption (IBE) is one of the most important primitives in cryptography, and various security notions of IBE (e.g., IND-ID-CCA2, NM-ID-CCA2, IND-sID-CPA etc.) have been introduced and the relations among them have been clarified recently. This paper, for the first time, investigate the security of IBE in the universally composable (UC) framework. This paper first defines the...
The paper presented an identity based encryption (IBE) under selective opening attack (SOA) whose security is almost-tightly related to a set of computational assumptions. Our result is a combination of Bellare, Waters, and Yilek’s method [TCC, 2011] for constructing (not tightly) SOA secure IBE and Hofheinz, Koch, and Striecks’ technique [PKC, 2015] on building almost-tightly secure IBE in the...
Identity Based Encryption (IBE) is a public key cryptosystem where a unique identity string, such as an e-mail address, can be used as a public key. IBE is simpler than the traditional PKI since certificates are not needed. An IBE scheme is usually based on pairing of discrete points on elliptic curves. An IBE scheme can also be based on quadratic residuosity. This paper presents an overview of...
At EUROCRYPT 2005, Sahai and Waters presented the Fuzzy Identity Based Encryption (Fuzzy-IBE) which could be used for biometrics and attribute-based encryption in the selective-identity model. When a secure Fuzzy-IBE scheme in the selective-identity model is transformed to full identity model it exist an exponential loss of security. In this paper, we use the CPA secure Gentry's IBE (exponent i...
Inference to the Best Explanation (IBE) and Bayesianism are our two most prominent theories of scientific inference. Are they compatible? Van Fraassen famously argued that they are not, concluding that IBE must be wrong since Bayesianism is right. Writers since then, from both the Bayesian and explanationist camps, have usually considered van Fraassen’s argument to be misguided, and have plumpe...
In this paper, we present a novel framework for the generic construction of biometric Identity Based Encryption (IBE) schemes, which do not require bilinear pairings and result in more efficient schemes than existing fuzzy IBE systems implemented for biometric identities. Also, we analyze the security properties that are specific to biometric IBE namely anonymity and identity privacy. Consideri...
This paper shows that the standard security notion for identity based encryption schemes (IBE), that is IND-ID-CCA2, captures the essence of security for all IBE schemes. To achieve this intention, we first describe formal definitions of the notions of security for IBE , and then present the relations among OW, IND, SS and NM in IBE , along with rigorous proofs. With the aim of comprehensivenes...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید