{"provider_url":"https://hatena.blog","height":"190","width":"100%","categories":["crypt"],"author_name":"smoking186","provider_name":"Hatena Blog","type":"rich","author_url":"https://blog.hatena.ne.jp/smoking186/","image_url":null,"url":"https://186.hatenablog.com/entry/20081213/1229155191","blog_title":"186 @ hatenablog","published":"2008-12-13 16:59:51","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20081213%2F1229155191\" title=\" \u65e5\u5831 - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","title":" \u65e5\u5831","description":"M\u5e02\u306b\u884c\u304f G. Hanaoka and K. Kurosawa \u201cEfficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumtpion.\u201d (ASIACRYPT 2008) Broadcast Encryption\u304b\u3089\u306e\u5909\u63db\u3067CCA2\u5b89\u5168\u306a\u516c\u958b\u9375\u6697\u53f7\u3092\u4f5c\u308b\u3042\u308c. \u3053\u306e\u6587\u8108\u3067Rosen and Segev (TCC 2009) \u3082\u4e0a\u624b\u304f\u6349\u3048\u3089\u308c\u305d\u3046\u306a\u6c17\u304c\u3059\u308b\u306e\u3067\u30e1\u30e2. \u5f8c\u3067\u6574\u5408\u6027\u3092\u78ba\u8a8d\u3059\u308b. ASIACRYPT 2008\u306eRump Session\u306eSo\u2026","version":"1.0","blog_url":"https://186.hatenablog.com/"}