Ibe (identity based encryption)
2016-08-23
0 0 0
4.0
Other
Earn points
IBE identity-based encryption algorithm by Shamir in 1984 first proposed. The basic idea of this is that the public key encryption algorithm can be any unique string, such as email address, ID card or other signs, it has the advantage that the public key is identifiable, usually does not require PKI certificate issuing system, while in order to implement the algorithm in the form of an elliptic curve.
Security IBE encryption scheme based on a distortion CDH (Com puta-tional Diffie.Henman) difficult issues, called BDH (Bilinear-Diffie-Hellm an) issue. Core IBE is the use of a bilinear mapping (Weil pairing) over elliptic curve.
Bilinear mapping is corrected for Weil and Tate on the summary and abstract, is the first practical IBE scheme mouth] key reason for the success, which in most of the IBE program in 2001 after the applications have been .
Security IBE encryption scheme based on a distortion CDH (Com puta-tional Diffie.Henman) difficult issues, called BDH (Bilinear-Diffie-Hellm an) issue. Core IBE is the use of a bilinear mapping (Weil pairing) over elliptic curve.
Bilinear mapping is corrected for Weil and Tate on the summary and abstract, is the first practical IBE scheme mouth] key reason for the success, which in most of the IBE program in 2001 after the applications have been .
java
加密
IBE
基于
身份
Related Source Codes
Android AOA Android Open Accessory Development Usi
0
0
no vote
VPN source code accelerator
0
0
no vote
VPN source code
0
0
no vote
Springboot Campus Recruitment System
0
0
no vote
Java intelligent QR code access control management
0
0
no vote
No comment