Identity-based encryption scheme against adaptive leakage
In allusion to the problem that scheme resilient to adaptive leakage was lacked in identity-based encryption,a notion of entropic leakage-resilient was used to define the security against adaptive leakage in IBE.Then by using identity-based hash proof system and extractors,an adaptive-leakage secure...
Saved in:
Main Authors: | Jia-hui TANG, Yan-qin ZHU, Xi-zhao LUO |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)07-0090-06/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Leakage-resilient certificateless signcryption scheme
by: Yan-lin QIN, et al.
Published: (2017-11-01) -
Data leakage prevention system based on transparent encryption for mobile terminal equipment
by: Zhen-tao HUANG, et al.
Published: (2016-10-01) -
Cross pattern hiding structured encryption for conjunctive queries
by: YANG Ziyi, et al.
Published: (2024-06-01) -
Leakage analysis of the recirculating cooling water system in petrochemical enterprises
by: GAO Xin, et al.
Published: (2025-01-01) -
Numerical Simulation of Oil Pipeline Leakage Diffusion in Dashagou Yellow River Crossing Section
by: Shaokang Liu, et al.
Published: (2025-01-01)