搜索结果: 1-12 共查到“计算机工程 Encryption”相关记录12条 . 查询时间(0.39 秒)
Chosen-Ciphertext Security from Identity-Based Encryption
Identity-Based Encryption Chosen-Ciphertext Security
2015/8/5
We propose simple and efficient "CCA-secure" public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. When i...
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Resistant Broadcast Encryption Short Ciphertexts
2015/8/5
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both ciphertexts and priva...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
Efficient Selective Identity-Based Encryption Without Random Oracles
Random Oracles Identity-Based Encryption
2015/8/5
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model Selective identity secure IBE is a slightly weaker security model ...
Circular-Secure Encryption from Decision Diffie-Hellman
Decision Diffie-Hellman Circular-Secure Encryption
2015/8/5
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a ``key cycle'' usage, where we ha...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on the...
Private Database Queries Using Somewhat Homomorphic Encryption
Somewhat Homomorphic Encryption Database
2015/8/5
In a private database query system, a client issues queries to a database and obtains the results without learning anything else about the database and without the server learning the query. While pre...
Targeted malleability: homomorphic encryption for restricted computations
restricted computations homomorphic encryption
2015/8/5
We put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios we would like to restrict the homomorphic computations one can perform on encrypted data...
Low Overhead Broadcast Encryption from Multilinear Maps
Multilinear Maps Broadcast Encryption
2015/8/5
We use multilinear maps to provide a solution to the long-standing problem of public-key
broadcast encryption where all parameters in the system are small. In our constructions,
ciphertext overhead,...
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits
Arithmetic Circuit ABE Compact Garbled Circuits
2015/8/5
We construct the rst (key-policy) attribute-based encryption (ABE) system with short
secret keys: the size of keys in our system depends only on the depth of the policy circuit,
not its size. Our c...
Function-Private Subspace-Membership Encryption and Its Applications
Function privacy functional encryption
2015/8/5
Boneh, Raghunathan, and Segev (CRYPTO '13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy i...