| Keyword : standard model
| |
|
Convertible Nominative Signatures from Standard Assumptions without Random Oracles Goichiro HANAOKA Jacob SCHULDT | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A
No. 6 ;
pp. 1107-1121
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Keyword: user certification, nominative signatures, standard model, | | Summary | Full Text:PDF(570.7KB) | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
Relationship between Standard Model Plaintext Awareness and Message Hiding Isamu TERANISHI Wakaha OGATA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A
No. 1 ;
pp. 244-261
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Security Notions Keyword: plaintext awareness, standard model, | | Summary | Full Text:PDF(324.8KB) | |
|
On Some Variations of Kurosawa-Desmedt Public-Key Encryption Scheme Le Trieu PHONG Wakaha OGATA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A
No. 1 ;
pp. 226-230
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Keyword: hybrid encryption, standard model, DDH assumption, IND-CCA, | | Summary | Full Text:PDF(99KB) | |
|
k-Resilient Identity-Based Encryption in the Standard Model Swee-Huay HENG Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A
No. 1 ;
pp. 39-46
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography Keyword: identity-based encryption, standard model, | | Summary | Full Text:PDF(164.2KB) | |
|
A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications SeongHan SHIN Kazukuni KOBARA Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/03/01
Vol. E88-A
No. 3 ;
pp. 736-754
Type of Manuscript:
PAPER
Category: Information Security Keyword: entropy of passwords, on-line and off-line attacks, authentication, key establishment protocol, leakage of stored secrets, proactive security, DDH problem, standard model, | | Summary | Full Text:PDF(524.8KB) | |
|
Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model Kazukuni KOBARA Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A
No. 10 ;
pp. 2229-2237
Type of Manuscript:
Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security Keyword: entropy of passwords, key exchange, authentication, DDH problem, standard model, | | Summary | Full Text:PDF(271.4KB) | |
|
|