Results 241 to 250 of about 696,470 (284)
Some of the next articles are maybe not open access.

ID-Based Cryptography and Attribute-Based Cryptography

2023
Identity and attribute-based cryptosystems have now become the most interesting research area in cryptography. Id-based and attribute-based cryptography both are improved variants of public-key cryptography. The identity-based cryptography is based on the identity of the user, such as email address, IP address, or mobile number.
Malabika Das   +2 more
openaire   +1 more source

Novel quantum key distribution and attribute based encryption for cloud data security

Concurrency and Computation, 2023
Improvement of privacy and security in data centers is challenging with proficient safety key managing. So as to resolve this issue, data centers require proficient quantum cryptographic techniques with authentication methods that are suitable to improve
G. Verma, Ashutosh Kumar
semanticscholar   +1 more source

Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption

IEEE Transactions on Dependable and Secure Computing, 2022
The field of cryptography has endeavored to solve numerous security problems. However, a common premise of many of those problems is that the encryptor always generates the ciphertext correctly.
Intae Kim   +3 more
semanticscholar   +1 more source

An improved attribute-based signature using elliptic curve cryptography

Journal of Discrete Mathematical Sciences & Cryptography
The attribute-based signature(ABS) scheme enables users to sign messages based on their attributes while keeping their identities private. ECC provides strong security with smaller key sizes, enhancing the efficiency & practicality of the system. To address the high overhead of traditional ABS schemes, an improved attribute based signature scheme ...
Shivani Goel   +2 more
openaire   +1 more source

A Novel Pairing-Free ECC-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Secure Cloud Storage

International Conference on Information Systems Security and Privacy
: Proxy re-encryption (PRE) is a cryptographic primitive enabling data owner to delegate ciphertext access rights without leaking underlying plaintext to honest-but-curious cloud servers. The delegation of ciphertext access rights enhances the efficiency
Shivangi Shukla, Sankita J. Patel
semanticscholar   +1 more source

Survey of Post-Quantum Lattice-Based Ciphertext-Policy Attribute-Based Encryption Schemes for Cloud Storage: Taxonomy, Open Issues, and Future Directions

IEEE Transactions on Services Computing
Ciphertext Policy Attribute-Based Encryption (CP-ABE) is one of the most prevalent cryptographic primitives for realizing privacy and fine-grained access control in cloud computing.
Gudipati Sravya   +2 more
semanticscholar   +1 more source

AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography

2013
Onion routing has been employed as a technique for ensuring anonymous communication over a public channel to ensure the integrity of the message as well as the privacy of the contending entities amidst untrusted routers. The technique ensures that the actual data as well as the meta-data in the packet are hidden from the prying intermediaries.
Nishant Doshi, Devesh Jinwala
openaire   +1 more source

A Revocable and Fair Outsourcing Attribute-Based Access Control Scheme in Metaverse

IEEE transactions on consumer electronics
Amidst the rapid advancements in metaverse and consumer electronics technology, individuals now have the opportunity to engage in immersive interactive experiences.
Conghao Ruan   +5 more
semanticscholar   +1 more source

Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things

International Journal of Intelligent Computing and Cybernetics, 2017
Purpose Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system ...
Vivek V. Jog, Senthil Murugan T.
openaire   +1 more source

ATTRIBUTE-BASED ENCRYPTIONS AND FORMAL VERIFICATION OF LATTICE-BASED CRYPTOGRAPHY

2019
199 pages ; Since the early works of Ajtai (STOC’96) and Regev (STOC’05), lattice-based cryptography has proven to be a powerful building block in cryptography. My research focuses on further exploring the expressive power of lattice-based cryptography, as well as formal verification of lattice-based cryptographic schemes.
openaire   +2 more sources

Home - About - Disclaimer - Privacy