نتایج جستجو برای: broadcast encryption
تعداد نتایج: 56272 فیلتر نتایج به سال:
The issue of tight security for identity-based encryption schemes (IBE) in bilinear groups has been widely investigated and a lot of optimal properties have been achieved. Recently, a tightly secure IBE scheme in bilinear groups under the multi-challenge setting has been achieved by Chen et al. (to appear in PKC 2017), and their scheme even achieves constant-size public parameters and is adapti...
Key establishment is any process whereby a shared secret key becomes available to two or more parties, for subsequent cryptographic use such as symmetrickey encryption. Though it is widely known that the primitive of encryption is different from key establishment, we find some researchers have confused the two primitives. In this note, we shall clarify the fundamental difference between the two...
In this paper, we discuss an isomorphism between elliptic curves defined over binary fields (curves defined over F2n). We introduce a simple public-key encryption scheme for binary elliptic curves. Here we demonstrate that this encryption scheme is as secure as the EC El Gamal cryptosystem. The basis of the encryption scheme is this isomorphism between binary elliptic curves. We use this same i...
Reliable broadcast protocols are a fundamental building block for implementing replication in fault-tolerant distributed systems. This paper addresses secure service replication in an asynchronous environment with a static set of servers, where a malicious adversary may corrupt up to a threshold of servers and controls the network. We develop a formal model using concepts from modern cryptograp...
Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles. This supports latency-critical applications for improved safety and maybe optimized traffic. However, V2V is vulnerable to cyber attacks involving message manipulation. Mechanisms are required ensure both authenticity integrity of data, while maintaining drivers privacy against...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید