搜索结果: 1-8 共查到“Bilinear pairing”相关记录8条 . 查询时间(0.108 秒)
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Proxy signature certificate-based message recovery
2016/1/26
In this paper, we propose the first provable secure certificate-based proxy signature with message
recovery without bilinear pairing. The notion of certificate-based cryptography was initially
intro...
Breaking a certificateless key agreement protocol withour bilinear pairing
public-key cryptography Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
2011/6/9
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. Man...
Recently, composite-order bilinear pairing has been shown to be useful in many cryptographic constructions. However, it is time-costly to evaluate. This is because the composite order should be at lea...
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
cryptographic protocols / oblivious transfer mutual authentication ID-based cryptosystem impersonation bilinear pairing
2012/3/29
As traditional oblivious transfer protocols are treated as cryptographic primitives in most cases, they are usually executed without the consideration of possible attacks, e.g., impersonation, replayi...
Enhanced Privacy ID (EPID) is a cryptographic scheme that enables the remote authenti-
cation of a hardware device while preserving the privacy of the device. EPID can be seen as a
direct anonymous ...
Chameleon Signature from Bilinear Pairing
Digital signatures bilinear pairing chameleon hashing
2009/4/10
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is tha...
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
timed release encryption bilinear pairing anonymity
2009/3/27
We consider the problem of sending messages into the future, commonly known as timed
release cryptography. Existing schemes for this task either solve the relative time problem
with uncontrollable, ...
Analysis of Bilinear Pairing-based Accumulator for Identity Escrowing
Bilinear Pairing Collision Resistance Cryptographic Accumulators Identity Escrow Group Signature
2012/12/3
An accumulator based on bilinear pairings was proposed at CT-RSA’05. In this paper, we first demonstrate that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator which i...