搜索结果: 1-4 共查到“军事学 key update”相关记录4条 . 查询时间(0.059 秒)
Bidirectional Asynchronous Ratcheted Key Agreement without Key-Update Primitives
secure communication post-compromise security ratchet
2018/11/9
Following up mass surveillance and privacy issues, modern secure communication protocols now seek for more security such as forward secrecy and post-compromise security. They cannot rely on any assump...
Revocable IBE Systems with Almost Constant-size Key Update
identity-based encryption revocation
2014/3/10
Identity-based encryption (IBE) has been regarded as an attractive alternative to more conventional certificate-based public key systems. It has recently attracted not only considerable research from ...
In regular digital signatures, once the secret key is compromised, all signatures, even those
that were issued by the honest signer before the compromise, will not be trustworthy any more.
Forward-s...
Fully Resilient Traitor Tracing Scheme using Key Update
Fully Resilient Traitor Tracing Scheme Key Update
2008/6/3
This paper proposes fully resilient traitor tracing schemes which have no
restriction about the number of traitors. By using the concept of key update, the
schemes can make the pirate decoders usele...