Results 1 to 10 of about 38,037 (283)

Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters. [PDF]

open access: goldPLoS ONE, 2018
Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted a lot of attention in recent years, many RHIBE ...
Qianqian Xing   +3 more
doaj   +5 more sources

Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data [PDF]

open access: goldJournal of Cloud Computing: Advances, Systems and Applications
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly   +2 more
doaj   +4 more sources

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption [PDF]

open access: greenTheoretical Computer Science, 2015
Revocable Hierarchical Identity-Based Encryption (RHIBE) is a variant of Identity-Based Encryption (IBE), which enables the dynamic user management; a Key Generation Center (KGC) of a usual IBE has a key issuing ability. In contrast, in a RHIBE, a KGC can revoke compromised secret keys and even delegate both key issuing ability and revocation ability.
Jae Hong Seo, Keita Emura
semanticscholar   +14 more sources

A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption [PDF]

open access: goldIEEE Access, 2022
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that provides the efficient key revocation function by broadcasting an update key per each time period. Many RHIBE schemes have been proposed by combining an HIBE scheme and
Kwangsu Lee, Joon Sik Kim
doaj   +3 more sources

Tightly Secure Hierarchical Identity-Based Encryption [PDF]

open access: hybridJournal of Cryptology, 2019
AbstractWe construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length.The
Langrehr, R., Pan, J.
semanticscholar   +9 more sources

Efficient identity-based encryption with Hierarchical key-insulation from HIBE [PDF]

open access: hybridDesigns, Codes and Cryptography, 2021
AbstractHierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that allows users to update their secret keys to achieve (hierarchical) key-exposure resilience, which is an important notion in practice. However, existing HKIBE constructions have limitations in efficiency: sizes of ciphertexts and secret keys ...
Keita Emura   +2 more
semanticscholar   +3 more sources

Timed-Release Hierarchical Identity-Based Encryption [PDF]

open access: hybridInternational Journal of Advanced Computer Science and Applications, 2014
We propose a notion of hierarchical identity-based encryption (HIBE) scheme with timed-release encryption (TRE) mechanism, timed-release hierarchical identity-based encryption (TRHIBE), and define its security models. We also show a generic construction of TRHIBE from HIBE and one-time signature, and discuss the security of the constructed scheme.
Toru Oshikiri, Taiichi Saito
openaire   +2 more sources

Revocable hierarchical identity-based broadcast encryption [PDF]

open access: diamondTsinghua Science and Technology, 2018
Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of users while only intended users can decrypt. However, current HIBBE schemes do not support efficient revocation of private keys.
Dawei Li   +4 more
openaire   +2 more sources

Identity-Based Efficient Secure Data Communication Protocol for Hierarchical Sensor Groups in Smart Grid [PDF]

open access: yesSensors
With the rapid evolution of smart grids, secure and efficient data communication among hierarchical sensor devices has become critical to ensure privacy and system integrity.
Yun Feng   +4 more
doaj   +2 more sources

Generalized Key Delegation for Hierarchical Identity-Based Encryption [PDF]

open access: bronzeIET Information Security, 2007
This paper introduces a new primitive called identity-based encryption with wildcard key derivation (WKD-IBE or 'wicked IBE') that enhances the concept of hierarchical identity-based encryption by allowing more general key delegation patterns. A secret key is derived for a vector of identity strings, where entries can be left blank using a wildcard ...
Abdalla, Michel   +2 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy