Abstract
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.
Highlights
摘 要:探討多模型下同時安全的體制構造、證明理論與方法有助於構造多環境下形式化安全的密碼 體制,本文進一步研究了高效的 IBE 體制構造和 CCA 模式下的可證明安全,基於所構造的體制探討 了 RO 和無 RO 模型下的安全證明,並避免了本文指出的以往證明中在規約效率方面的不足,基於標 準 DBDH 問題在兩種模型下證明體制的可證明安全性,另外該體制的特點是參數規模和密文長度更 小,分別為 4 個群元素,安全證明規約更簡化和緊致。
Further research is provided on the construction of efficient IBE scheme and provable security under CCA model
Elementary investigations on pairing-based CCA secure IBE scheme which is provably secure based on RO and non-RO model were provided
Summary
摘 要:探討多模型下同時安全的體制構造、證明理論與方法有助於構造多環境下形式化安全的密碼 體制,本文進一步研究了高效的 IBE 體制構造和 CCA 模式下的可證明安全,基於所構造的體制探討 了 RO 和無 RO 模型下的安全證明,並避免了本文指出的以往證明中在規約效率方面的不足,基於標 準 DBDH 問題在兩種模型下證明體制的可證明安全性,另外該體制的特點是參數規模和密文長度更 小,分別為 4 個群元素,安全證明規約更簡化和緊致。. (t O(qID qE qD ), ) -DBDH 假設成立,則該 IBE
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.