National Tsing Hua University Institutional Repository:Anonymous Multi-Receiver Certificate-Based Encryption
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 54367/62174 (87%)
造访人次 : 13935122      在线人数 : 14
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTHU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    National Tsing Hua University Institutional Repository > 歷任校長 > 陳文村 (2006-2010)  > 會議論文 >  Anonymous Multi-Receiver Certificate-Based Encryption


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://nthur.lib.nthu.edu.tw/dspace/handle/987654321/81583


    题名: Anonymous Multi-Receiver Certificate-Based Encryption
    作者: Chun-I Fan;Pei-Jen Tsai;Jheng-Jia Huang;W. T. Chen
    教師: 陳文村
    日期: 2013
    出版者: Institute of Electrical and Electronics Engineers
    關聯: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), Institute of Electrical and Electronics Engineers, Beijing, China, 10-12 October 2013
    关键词: Anonymity
    Bilinear Pairing
    Certificate-Based Encryption
    Key Escrow Freeness
    Multi-Receiver Encryption
    摘要: In a multi-receiver encryption environment, a sender can randomly choose a set of authorized receivers while distributing messages to them efficiently and securely. Recently, more and more researchers concern the privacy of receivers. They mentioned that an authorized receiver does not want other entities, except the service provider, to be able to derive her/his identity in many applications such as pay-TV. However, most of these protocols either provide no formal security proofs or are inefficient owing to high computation cost. In this paper, we construct a provably secure and efficient anonymous multi-receiver certificated-based encryption scheme, PMCE, which avoids the key escrow problem while preserving the implicit certification of identity-based setting. The proposed PMCE gets rid of pairing computation to encrypt a message and only needs one pairing computation to decrypt the cipher text. Finally, we define the security models and offer formal proofs to all properties including receiver
    相関连結: http://www.ieee.org/index.html
    URI: http://nthur.lib.nthu.edu.tw/dspace/handle/987654321/81583
    显示于类别:[陳文村 (2006-2010) ] 會議論文
    [資訊工程學系] 會議論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML1722检视/开启


    在NTHUR中所有的資料項目都受到原著作權保護,僅提供學術研究及教育使用,敬請尊重著作權人之權益。若須利用於商業或營利,請先取得著作權人授權。
    若發現本網站收錄之內容有侵害著作權人權益之情事,請權利人通知本網站管理者(smluo@lib.nthu.edu.tw),管理者將立即採取移除該內容等補救措施。

    SFX Query

    與系統管理員聯絡

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈