搜索结果: 1-11 共查到“PKG”相关记录11条 . 查询时间(0.072 秒)
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks
Provable Security Random Oracle Model eCK model
2015/12/22
In this paper we propose an efficient single-round, two-party
identity based authenticated key agreement protocol in the setting of
multiple Private Key Generators (PKGs). One of the major advantage...
通过中等强度跑台运动干预,探讨运动经cGMP-PKGⅡ-ENaC通路对去卵巢大鼠骨量的影响效应,为阐明有氧运动对骨量的影响及机制提供实验依据。 方法:3月龄雌性SD大鼠随机分为10组:BC(基础对照组)、SHAM4、8、12(假手术4、8、12周)组;OVX4、8、12(去卵巢对照4、8、12周)组;OVX+T4、8、12(去卵巢+运动4、8、12周)组。运动组采用跑台训练,坡度5°,5d/w。以...
广义签密是指除了能实现签密功能,还可单独实现加密和认证功能的密码机制。该文定义了不同PKG环境下基于身份的广义签密方案较为全面的安全模型,并提出一个具体方案,进而在标准模型下证明了方案的安全性。和已有的不同PKG环境下基于身份签密方案相比,文中方案的效率较高,且应用范围更为广泛。
广义签密是指除了能实现签密功能,还可单独实现加密和认证功能的密码机制。该文定义了不同PKG环境下基于身份的广义签密方案较为全面的安全模型,并提出一个具体方案,进而在标准模型下证明了方案的安全性。和已有的不同PKG环境下基于身份签密方案相比,文中方案的效率较高,且应用范围更为广泛。
安全的无可信PKG的部分盲签名方案
部分盲签名方案 无可信私钥生成 身份攻击
2012/4/20
利用Gap Diffie-Hellman(GDH)群,在部分盲签名机制的基础上,提出了一个有效的基于身份的无可信私钥生成中心(PKG,private key generator)的部分盲签名方案。方案中PKG不能够伪造合法用户的签名,因为它只能生成一部分私钥。在随机预言模型下,新方案能抵抗适应性选择消息攻击和身份攻击下的存在性伪造,其安全性依赖于CDHP问题。该方案满足正确性和部分盲性,与Chow...
不同PKG环境下可证安全的基于身份AKA协议
密码学 认证密钥协商 基于身份 双线性对 不同PKG环境 Trapdoor test技术
2011/5/18
目前大多数基于身份认证密钥协商协议需要参与协议双方在同一个PKG环境下,而实际应用中需要在不同PKG环境下的用户之间也能进行安全通信。该文结合twin Diffie-Hellman问题提出了一个全新的不同PKG环境下的基于身份认证密钥协商协议。利用Cash等人在2008年欧密会上提出的“trapdoor test”技术在eCK模型中将新协议的安全性规约到标准的CDH和BDH 假设。
On the Role of PKG for Proxy Re-encryption in Identity Based Setting
PKG Proxy Re-encryption Identity Based Setting
2009/6/9
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called
proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under
Alice’s publi...
Here we propose an identity based signcryption scheme in the multi-PKG environment where sender and receiver receive public key from different PKG. We also define security models for our scheme and gi...
Practical Identity-Based Encryption (IBE) in Multiple-PKG Environments and Its Applications
identity-based encryption (IBE) multiple-PKG environments public key encryption (PKE) escrowed ElGamal
2008/9/9
Identity-based encryption (IBE) schemes are usually used in multiple-
PKG environments on the one hand, each administrative domain (e.g., a
relatively small and close organization) maintains its own...
Efficient ID-based Signature Without Trusted PKG
ID-based Signature Key Escrow Bilinear Pairing Dishonest PKG Education, Xidian University State Key Laboratory of Integrated Service Networks, Xidian University
2008/9/3
In this paper, we introduce the exact concept of ID-based
signature without trusted Private Key Generater(PKG), which solves
the key escrow problem through binding two public key with a same
identi...
Reducing Trust in the PKG in Identity Based Cryptosystems
Reducing Trust PKG Identity Based Cryptosystems
2008/5/28
One day, you suddenly find that a private key corresponding to your Identity is up for sale at
e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is acting
dishonestly ...