Zobrazeno 1 - 10
of 566
pro vyhledávání: '"Diffie-Hellman problem"'
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 1 (2023)
In this paper, we propose a new and efficient short signature scheme from the bilinear pairings. Our scheme is constructed by bilinear inverse-square Diffie-Hellman problem (BISDHP) and does not require any special hash function. The exact security p
Externí odkaz:
https://doaj.org/article/de77b5d3fcfa456fb44376ea35ac5b96
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-12 (2022)
Abstract In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data confidentiality is an important issue. In 2004, Boneh et al. proposed the first public-key searchable enc
Externí odkaz:
https://doaj.org/article/573e1f27c83b4792ba4aa04fd1910ac3
Publikováno v:
网络与信息安全学报, Vol 6, Pp 128-136 (2020)
A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two tripl
Externí odkaz:
https://doaj.org/article/4a50551a315e425d971fe6a30adc7e80
Publikováno v:
网络与信息安全学报, Vol 6, Iss 6, Pp 128-136 (2020)
A triple receiver public key cryptosystem was proposed. In the cryptosystem, a sender encrypted a message and sent to three receivers, while the three receivers were able to decrypt the message with their own private keys. Based on bilinear map, two
Externí odkaz:
https://doaj.org/article/ec113097f5e64572b5d01c6ae8e838ac
Autor:
YE Sheng-nan, CHEN Jian-hua
Publikováno v:
Jisuanji kexue, Vol 48, Iss 10, Pp 272-277 (2021)
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management probl
Externí odkaz:
https://doaj.org/article/ee9ee681067f44ada73c81433f5497f8
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Tongxin xuebao, Vol 38, Pp 10-17 (2017)
Exiting heterogeneous signcryption schemes which were between public key infrastructure (PKI) and identity-based cryptosystem (IBC) have some limitations.A new heterogeneous signcryption scheme between PKI and IBC was proposed.In the random oracle mo
Externí odkaz:
https://doaj.org/article/afb308244bd241fc92cec2d5e976d4f7
Autor:
A. V. Mazurenko, V. A. Stukopin
Publikováno v:
Advanced Engineering Research, Vol 18, Iss 2, Pp 246-255 (2018)
Introduction. One of the tasks arising in cryptography is to ensure a safe and fair conduct of e-voting. This paper details the algorithm of electronic elections particularly that part which deals with the cryptographic security. Materials and Method
Externí odkaz:
https://doaj.org/article/6affb6e0107840099bed9c10052289b1
Autor:
Kushwaha Prabhat
Publikováno v:
Journal of Mathematical Cryptology, Vol 12, Iss 2, Pp 101-118 (2018)
In 2004, Muzereau, Smart and Vercauteren [A. Muzereau, N. P. Smart and F. Vercauteren, The equivalence between the DHP and DLP for elliptic curves used in practical applications, LMS J. Comput. Math. 7 2004, 50–72] showed how to use a reduction alg
Externí odkaz:
https://doaj.org/article/583f6b6989354bc580f3e3f653b085f6