نتایج جستجو برای: broadcast encryption

تعداد نتایج: 56272  

Journal: :IACR Cryptology ePrint Archive 2016
Linfeng Zhou

The issue of tight security for identity-based encryption schemes (IBE) in bilinear groups has been widely investigated and a lot of optimal properties have been achieved. Recently, a tightly secure IBE scheme in bilinear groups under the multi-challenge setting has been achieved by Chen et al. (to appear in PKC 2017), and their scheme even achieves constant-size public parameters and is adapti...

Journal: :CoRR 2015
Zhengjun Cao Lihua Liu

Key establishment is any process whereby a shared secret key becomes available to two or more parties, for subsequent cryptographic use such as symmetrickey encryption. Though it is widely known that the primitive of encryption is different from key establishment, we find some researchers have confused the two primitives. In this note, we shall clarify the fundamental difference between the two...

2010
Brian King

In this paper, we discuss an isomorphism between elliptic curves defined over binary fields (curves defined over F2n). We introduce a simple public-key encryption scheme for binary elliptic curves. Here we demonstrate that this encryption scheme is as secure as the EC El Gamal cryptosystem. The basis of the encryption scheme is this isomorphism between binary elliptic curves. We use this same i...

Journal: :IACR Cryptology ePrint Archive 2001
Christian Cachin Klaus Kursawe Frank Petzold Victor Shoup

Reliable broadcast protocols are a fundamental building block for implementing replication in fault-tolerant distributed systems. This paper addresses secure service replication in an asynchronous environment with a static set of servers, where a malicious adversary may corrupt up to a threshold of servers and controls the network. We develop a formal model using concepts from modern cryptograp...

Journal: :Asia-pacific Journal of Convergent Research Interchange 2016

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles. This supports latency-critical applications for improved safety and maybe optimized traffic. However, V2V is vulnerable to cyber attacks involving message manipulation. Mechanisms are required ensure both authenticity integrity of data, while maintaining drivers privacy against...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید