| Document Date: 2010-08-30 11:15:58 Open Document File Size: 271,51 KBShare Result on Facebook
City Bristol / Paris / / Company IBM / / Country Italy / France / United Kingdom / / / Event FDA Phase / / Facility IBM T.J.Watson Research Center / University of Catania / University of Bristol / / IndustryTerm deterministic decapsulation algorithm / polynomial time algorithms / agreement protocols / non-pure protocols / role-symmetric protocols / encapsulation algorithm / possible applications / agreement protocol / identity-based key agreement protocol / private key extraction algorithm / deterministic algorithm / / Organization University of Catania / R. There / University of Bristol / R. / Ecole Normale Sup´erieure / I. Initiator Responder dI / Key Generation Center / / Position Weak Type-I-CPA / CPA / security model for certificateless encryption / Private / ID-IND-CPA / / Product Bellare / Reveal / CCA2 / R0 / Rewind / Fiore / / TVStation KGCs / / Technology deterministic decapsulation algorithm / pure and non-pure ID-based key agreement protocols / pairing-based protocols / secure ID-KA protocol / underlying ID-KA protocol / Set-Private-Key algorithms / SCK protocols / role-symmetric protocols / secure KEMs/encryption / PKI / key agreement protocol / all pure ID-based key agreement protocols / FG protocol / identity-based encryption / private key / modelling two-pass protocols / secret key / identity-based key agreement protocol / key agreement protocols / ID-Based Encryption / Kudla protocol / two-pass protocols / SSL / Set-Public-Key algorithm / converting ID-based key agreement protocols / Encryption / two pass ID-based key agreement protocols / ID-based key agreement protocols / Set-User-Keys algorithm / PPT algorithm / public key / PPT encapsulation algorithm / six algorithms / ID-KA protocols / ID-based key agreement protocol / non-pure protocols / Station-toStation protocol / deterministic algorithm / pure ID-based KA protocol / seven polynomial time algorithms / private key extraction algorithm / pairing-based ID-based key agreement protocols / /
SocialTag |