搜索结果: 1-6 共查到“军事学 unidirectional”相关记录6条 . 查询时间(0.046 秒)
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
Proxy Re-Encryption Random Oracle Model Chosen Ciphertext Security
2018/11/29
Proxy re-encryption (PRE) enables delegation of decryption rights by entrusting a proxy server with special information, that allows it to transform a ciphertext under one public key into a ciphertext...
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
Department of Computer Science, Jinan University School of Information Systems, Singapore Management University
2010/7/13
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss in Eurocrypt'98, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the same me...
Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009
Proxy re-encryption chosen-ciphertext attack chosen-plaintext attack
2009/7/22
In Eurocrypt'98, Blaze, Bleumer and Strauss [4] introduced a primitive named proxy re-
encryption (PRE), in which a semi-trusted proxy can convert - without seeing the plaintext -
a ciphertext origi...
Efficient Unidirectional Proxy Re-Encryption
proxy re-encryption unidirectional chosen-ciphertext attack
2009/6/12
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally
intended for Alice into one encrypting the same message for Bob. The proxy only needs
a re-encryption key giv...
Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
Unidirectional Group-based Proxy
2009/6/5
Currently, researchers have focused their attention on proxy re-encryption scheme deployed between two entities. Lots of bidirectional schemes have been proposed and this kind of scheme is suitable fo...
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
Unidirectional Key Distribution RFID Security unidirectional channels
2009/6/2
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender
transmits information blindly to a receiver. We consider two approaches: (1) Key sharing across s...