搜索结果: 1-5 共查到“军队指挥学 secure public key encryption scheme”相关记录5条 . 查询时间(0.093 秒)
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Department of Computer Engineering,University of Peradeniya
2016/1/26
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simpl...
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
CCA2 Secure Public Key Encryption Scheme McEliece Assumptions Standard Model
2009/6/9
We show that a recently proposed construction by Rosen and Segev can be
used for obtaining the first public key encryption scheme based on the McEliece
assumptions which is secure against adaptive c...
A Forward-Secure Public-Key Encryption Scheme
A Forward-Secure Public-Key Encryption Scheme
Bilinear Diffe-Hellman Encryption Binary-tree encryption
2009/4/9
Cryptographic computations are often carried out on insecure devices for which the threat
of key exposure represents a serious and realistic concern. In an eort to mitigate the damage
caused by exp...