检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
出 处:《Chinese Journal of Electronics》2011年第2期317-322,共6页电子学报(英文版)
基 金:This work is supported by the National Natural Science Foundation of China (No.60772136, No.61003300), 863 Hi-Tech Research and Development Program of China (No.2007AA01Z435), National Key Technology R&D Program of China during the 9th Five-Year Plan Period (No.2008BAH22B03, No.2007BAH08B01), National 111 Program (No.B08038) and Fundamental Research Funds for the Central Universities 'No.JY10000901021).
摘 要:Identity based signcryption Key encapsulation mechanism (KEM) is used to encapsulate a symmetric key during the construction of hybrid signcryption in the identity based setting. We introduce the notion of Identity based signcryption KEM to multiple recipients (mIDSC-KEM), and define security models for this new primitive. We illustrate by proposing an efficient mIDSCKEM scheme. Our scheme is proved secure in the random oracle model under the Gap bilinear Diffie-Hellman (Gap-BDH) and the Computational Diflfle-Hellman (CDH) assumption.
关 键 词:Identity based signcryption KEM Multiple recipients INDISTINGUISHABILITY UNFORGEABILITY Random oracle model Gap bilinear Diffie-Hellman (Gap- BDH) Computational Diflle-Hellman (CDH).
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.46