搜索结果: 1-3 共查到“军队指挥学 ID-based cryptography”相关记录3条 . 查询时间(0.094 秒)
Hierarchical ID-Based Cryptography
identity-based cryptography hierarchical identity-based cryptography elliptic curves
2009/4/14
We present hierarchical identity-based encryption schemes and signature schemes that
have total collusion resistance on an arbitrary number of levels and that have chosen ciphertext security in the r...
ID-based Cryptography from Composite Degree Residuosity
ID-based Cryptography Composite Degree Residuosity
2009/3/27
We present identity-based identification (resp. encryption,
signature, blind signature, ring signature) from composite degree resid-
uosity (CDR). Constructions of identifications and signatures mot...
A Note on Secure Key Issuing in ID-based Cryptography
ID-based cryptography Key escrow problem Secure key issuing
2009/2/12
Most recently, Lee B. et al proposed a key issuing protocol for ID-based cryptography to solve the key escrow problem. However in this letter, we show that a malicious key generation center (KGC) can ...