Back to Results
First PageMeta Content
Security / Cipher / Advantage / ID-based encryption / XTR / Applied mathematics / Integrated Encryption Scheme / Cryptography / Cyberwarfare / Ciphertext indistinguishability


Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions Cheng Chen, Zhenfeng Zhang, and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, C
Add to Reading List

Document Date: 2011-12-20 20:36:43


Open Document

File Size: 370,41 KB

Share Result on Facebook

City

generalized identity / Introduction Identity / Boneh / Hamburg / /

Company

Dengguo Feng State Key Laboratory / /

/

Facility

Dengguo Feng State Key Laboratory of Information Security / Institute of Software / /

IndustryTerm

identity-based crypto systems / generation algorithm / polynomial time algorithms / crypto systems / secret key delegation algorithm / spatial decryption algorithm / inner product / decryption algorithm / cryptography systems / normal encryption algorithm / polynomial time algorithm / delegation algorithm / encryption algorithm / spatial encryption algorithm / /

Organization

Chinese Academy of Sciences / Institute of Software / /

Position

CPA / Cao / /

Product

Nikon D40 Digital Camera / Nikon D50 Digital Camera / iRiver T30 Portable Audio Device / Nikon D300 Digital Camera / Nikon D700 Digital Camera / Nikon D60 Digital Camera / /

Technology

predicate encryption / spatial encryption algorithm / polynomial time algorithm / encryption algorithm / real algorithm / 3.1 Algorithms / identity-Based Encryption / adaptively secure spatial encryption / The algorithm / private key / secret key / dual system encryption / attribute-based encryption / Encryption / cryptography / variant called doubly-spatial encryption / key generation algorithm / public key / 4 Adaptively Secure Spatial Encryption / doubly-spatial encryption / normal encryption algorithm / ciphertext inner product encryption / spatial encryption / spatial decryption algorithm / secret key delegation algorithm / encryption system / four polynomial time algorithms / simulation / delegation algorithm / decryption algorithm / semi-functional encryption / threshold-based encryption / selectively secure spatial encryption / /

SocialTag