Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (1)
Ibe (identity based encryption)
4.0
IBE identity-based encryption algorithm by Shamir in 1984 first proposed. The basic idea of this is that the public key encryption algorithm can be any unique string, such as email address, ID card or other signs, it has the advantage that the public key is identifiable, usually does not require PKI certificate issuing system, while in order to implement the algorithm in the form of an elliptic curve. Security IBE encryption scheme based on a distortion CDH (Com puta-tional Diffie.Henman) difficult issues, called BDH (Bilinear-Diffie-Hellm an) issue. Core IBE is the use of a bilinear mapping (Weil pairing) over elliptic curve. Bilinear mapping is corrected for Weil and Tate on the summary and abstract, is the first practical IBE scheme mouth] key reason for the success, which in most of the IBE program in 2001 after the applications have been .
jifeng520qq
2016-08-23
0
1
No more~