Back to Results
First PageMeta Content
Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Advantage / Cryptography / Public-key cryptography / Signcryption


Universally Composable Secure Group Communication Youliang Tian1,2 and Changgen Peng1,2 1 2
Add to Reading List

Document Date: 2014-08-28 03:00:32


Open Document

File Size: 133,78 KB

Share Result on Facebook

Company

Fiat / IDt / /

Country

China / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

China Institute of Cryptography / Guizhou University / Guzhou University / College of Science / /

IndustryTerm

extract algorithm / nsigncrypt algorithms / setup algorithm / sub-protocols / multi-party applications / composable group communication protocol / sub-systems / ind-stage algorithm / hybrid protocol / guess-stage algorithm / cryptographic protocols / large protocol / signcryption algorithm / multicast group communications / identity-based signcryption protocol / unsigncryption algorithm / signcryption protocol / e-th / /

Organization

Pi / FIDSC / China Institute of Cryptography and Data Security / IDf / IDi / Guizhou University / Guiyang / College of Science / Guzhou University / Guiyang / KGC / Pe / /

Position

multicast controller / /

Product

IDSCCCA2 / CCA2 / G1 / FIDSC / CA2 / B1 / P1 / /

ProgrammingLanguage

FP / /

Technology

Setup The setup algorithm / identity-based signcryption protocol / identity-based protocol / 10 Protocol / corresponding protocol / large protocol / Signcrypt The Signcrypt algorithm / private key / secret key / 4.1 Protocol / signcryption protocol / ind-stage algorithm / public key encryption / encryption / Cryptography / public key / signcryption algorithm / unsigncryption algorithm / communication protocol / 8 Protocol / The Extract algorithm / 5.2 Protocol / guess-stage algorithm / Unsigncrypt algorithm / extract algorithm / /

SocialTag