Results 241 to 250 of about 696,470 (284)
Some of the next articles are maybe not open access.
ID-Based Cryptography and Attribute-Based Cryptography
2023Identity and attribute-based cryptosystems have now become the most interesting research area in cryptography. Id-based and attribute-based cryptography both are improved variants of public-key cryptography. The identity-based cryptography is based on the identity of the user, such as email address, IP address, or mobile number.
Malabika Das +2 more
openaire +1 more source
Novel quantum key distribution and attribute based encryption for cloud data security
Concurrency and Computation, 2023Improvement of privacy and security in data centers is challenging with proficient safety key managing. So as to resolve this issue, data centers require proficient quantum cryptographic techniques with authentication methods that are suitable to improve
G. Verma, Ashutosh Kumar
semanticscholar +1 more source
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption
IEEE Transactions on Dependable and Secure Computing, 2022The field of cryptography has endeavored to solve numerous security problems. However, a common premise of many of those problems is that the encryptor always generates the ciphertext correctly.
Intae Kim +3 more
semanticscholar +1 more source
An improved attribute-based signature using elliptic curve cryptography
Journal of Discrete Mathematical Sciences & CryptographyThe attribute-based signature(ABS) scheme enables users to sign messages based on their attributes while keeping their identities private. ECC provides strong security with smaller key sizes, enhancing the efficiency & practicality of the system. To address the high overhead of traditional ABS schemes, an improved attribute based signature scheme ...
Shivani Goel +2 more
openaire +1 more source
International Conference on Information Systems Security and Privacy
: Proxy re-encryption (PRE) is a cryptographic primitive enabling data owner to delegate ciphertext access rights without leaking underlying plaintext to honest-but-curious cloud servers. The delegation of ciphertext access rights enhances the efficiency
Shivangi Shukla, Sankita J. Patel
semanticscholar +1 more source
: Proxy re-encryption (PRE) is a cryptographic primitive enabling data owner to delegate ciphertext access rights without leaking underlying plaintext to honest-but-curious cloud servers. The delegation of ciphertext access rights enhances the efficiency
Shivangi Shukla, Sankita J. Patel
semanticscholar +1 more source
IEEE Transactions on Services Computing
Ciphertext Policy Attribute-Based Encryption (CP-ABE) is one of the most prevalent cryptographic primitives for realizing privacy and fine-grained access control in cloud computing.
Gudipati Sravya +2 more
semanticscholar +1 more source
Ciphertext Policy Attribute-Based Encryption (CP-ABE) is one of the most prevalent cryptographic primitives for realizing privacy and fine-grained access control in cloud computing.
Gudipati Sravya +2 more
semanticscholar +1 more source
AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography
2013Onion routing has been employed as a technique for ensuring anonymous communication over a public channel to ensure the integrity of the message as well as the privacy of the contending entities amidst untrusted routers. The technique ensures that the actual data as well as the meta-data in the packet are hidden from the prying intermediaries.
Nishant Doshi, Devesh Jinwala
openaire +1 more source
A Revocable and Fair Outsourcing Attribute-Based Access Control Scheme in Metaverse
IEEE transactions on consumer electronicsAmidst the rapid advancements in metaverse and consumer electronics technology, individuals now have the opportunity to engage in immersive interactive experiences.
Conghao Ruan +5 more
semanticscholar +1 more source
International Journal of Intelligent Computing and Cybernetics, 2017
Purpose Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system ...
Vivek V. Jog, Senthil Murugan T.
openaire +1 more source
Purpose Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system ...
Vivek V. Jog, Senthil Murugan T.
openaire +1 more source
ATTRIBUTE-BASED ENCRYPTIONS AND FORMAL VERIFICATION OF LATTICE-BASED CRYPTOGRAPHY
2019199 pages ; Since the early works of Ajtai (STOC’96) and Regev (STOC’05), lattice-based cryptography has proven to be a powerful building block in cryptography. My research focuses on further exploring the expressive power of lattice-based cryptography, as well as formal verification of lattice-based cryptographic schemes.
openaire +2 more sources

