搜索结果: 1-8 共查到“计算机处理器技术 Encryption”相关记录8条 . 查询时间(0.109 秒)
Chosen-Ciphertext Security from Identity-Based Encryption
Identity-Based Encryption Chosen-Ciphertext Security
2015/8/5
We propose simple and efficient "CCA-secure" public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. When i...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
Efficient Selective Identity-Based Encryption Without Random Oracles
Random Oracles Identity-Based Encryption
2015/8/5
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model Selective identity secure IBE is a slightly weaker security model ...
Circular-Secure Encryption from Decision Diffie-Hellman
Decision Diffie-Hellman Circular-Secure Encryption
2015/8/5
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a ``key cycle'' usage, where we ha...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on the...
Targeted malleability: homomorphic encryption for restricted computations
restricted computations homomorphic encryption
2015/8/5
We put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios we would like to restrict the homomorphic computations one can perform on encrypted data...
Low Overhead Broadcast Encryption from Multilinear Maps
Multilinear Maps Broadcast Encryption
2015/8/5
We use multilinear maps to provide a solution to the long-standing problem of public-key
broadcast encryption where all parameters in the system are small. In our constructions,
ciphertext overhead,...
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits
Arithmetic Circuit ABE Compact Garbled Circuits
2015/8/5
We construct the rst (key-policy) attribute-based encryption (ABE) system with short
secret keys: the size of keys in our system depends only on the depth of the policy circuit,
not its size. Our c...