搜索结果: 1-15 共查到“军队指挥学 broadcast encryption”相关记录39条 . 查询时间(0.125 秒)
Identity-based Broadcast Encryption with Efficient Revocation
Broadcast encryption revocation asymmetric pairings
2019/1/18
Identity-based broadcast encryption (IBBE) is an effective method to protect the data security and privacy in multi-receiver scenarios, which can make broadcast encryption more practical. This paper f...
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
broadcast encryption bilinear group
2018/5/2
We present a new public key broadcast encryption scheme where both the ciphertext and secret keys consist of a constant number of group elements. Our result improves upon the work of Boneh, Gentry, an...
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
broadcast encryption secure multicast wildcard
2017/5/15
Public key broadcast encryption is a cryptographic method to securely transmit a message from anyone to a group of receivers such that only privileged users can decrypt it. A secure multicast system a...
Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation
anonymous broadcast encryption outsider anonymity ternary subset difference
2017/3/27
This paper puts forward an efficient broadcast encryption in public key setting employing ternary tree subset difference method for revocation. It provides outsider anonymity disabling the revoked use...
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
multiparty NIKE (H)IBE broadcast encryption
2017/2/23
We define the concept of an encryptor combiner. Roughly, such a combiner takes as input n public keys for a public key encryption scheme, and produces a new combined public key. Anyone knowing a secre...
Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext
recipient revocable broadcast encryption chosen plaintext attack adaptive security
2017/2/20
In this paper, we put forward the first adaptively secure recipient revocable broadcast encryption (RR-BE) scheme in the standard model. The scheme is adaptively secure against chosen plaintext attack...
Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle
Broadcast encryption Hierarchical identity-based encryption Identity-based multi designated verifier signature
2016/12/10
Hierarchical identity-based broadcast encryption (HIBBE) organizes the users in a tree-like structure in which they can delegate the decryption ability to their subordinates. In addition, the trusted ...
Secure and Efficient Construction of Broadcast Encryption with Dealership
broadcast encryption with dealership chosen plaintext attack maximum number of accountability
2016/12/10
Broadcast encryption with dealership (BED) has been proposed to achieve more innovative and scalable business models for broadcast services. It has an extensive application future. However, designing ...
Collusion Resistant Broadcast Encryption with Tight Reductions and Beyond
Broadcast Encryption Tight Reduction
2016/12/8
The issue of tight security in identity-based encryption scheme (IBE) has been widely investigated.
Recently, a tightly secure IBE scheme of bilinear groups in the weak multi-challenge setting has be...
An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model
Broadcast Encryption Ciphertext-Policy Attribute-Based Encryption (CP-ABE) Access Structure
2016/12/7
In broadcast encryption schemes, a distribution center broadcasts an encrypted message to a subset SS chosen from a universe of receivers and only the intended users are able to decrypt the message. M...
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Hierarchical Identity-Based Broadcast Encryption Adaptive Security Chosen-ciphertext Security
2016/6/22
With the advances of cloud computing, data sharing becomes easier for large-scale enterprises. When deploying privacy and security schemes in data sharing systems, fuzzy-entity data sharing, entity ma...
Low Overhead Broadcast Encryption from Multilinear Maps
Broadcast encryption multilinear maps
2016/1/25
We use multilinear maps to provide a solution to the long-standing problem of public-key
broadcast encryption where all parameters in the system are small. In our constructions,
ciphertext overhead,...
Adaptively Secure Broadcast Encryption with Small System Parameters
Adaptive security broadcast encryption multilinear maps
2016/1/7
We build the first public-key broadcast encryption systems that simultaneously achieve
adaptive security against arbitrary number of colluders, have small system parameters, and have
security proofs...
Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext
Broadcast Encryption Cryptographic Membership Aggregation Function
2015/12/31
In this paper we present an identity-set-based broadcast encryption scheme with three working modes: positive membership (Select-mode), all member (All-mode), and negative membership (Cut-mode) over t...
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
Attribute-based encryption broadcast encryption
2015/12/23
Broadcasting is a very efficient way to securely transmit information to a large set of
geographically scattered receivers, and in practice, it is often the case that these receivers can be
grouped ...