Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Aggregate and verifiably encrypted signatures from bilinear maps
An aggregate signature scheme is a digital signature that supports aggregation: Given n
signatures on n distinct messages from n distinct users, it is possible to aggregate all these …
signatures on n distinct messages from n distinct users, it is possible to aggregate all these …
Identity-based encryption from the Weil pairing
We propose a fully functional identity-based encryption (IBE) scheme. The scheme has
chosen ciphertext security in the random oracle model assuming a variant of the …
chosen ciphertext security in the random oracle model assuming a variant of the …
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
A new public-key encryption scheme, along with several variants, is proposed and analyzed.
The scheme and its variants are quite practical and are proved secure against adaptive …
The scheme and its variants are quite practical and are proved secure against adaptive …
Selecting cryptographic key sizes
LNCS 1751 - Selecting Cryptographic Key Sizes Page 1 H. Imai, Y. Zheng (Eds.): PKC 2000,
LNCS 1751, pp. 446-465, 2000. © Springer-Verlag Berlin Heidelberg 2000 Selecting …
LNCS 1751, pp. 446-465, 2000. © Springer-Verlag Berlin Heidelberg 2000 Selecting …
Intrusion-resilient public-key encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most
likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilience …
likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilience …
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
O Wakaha - Cryptology ePrint Archive, 2006 - eprint.iacr.org
In this paper, we present some more results about the security of the Kurosawa-Desmedt
encryption scheme and a variant of it. We prove that after a modification, those schemes are …
encryption scheme and a variant of it. We prove that after a modification, those schemes are …