Results 1 to 10 of about 20,722 (263)
Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters. [PDF]
Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted a lot of attention in recent years, many RHIBE ...
Qianqian Xing +3 more
doaj +2 more sources
Identity-Based Efficient Secure Data Communication Protocol for Hierarchical Sensor Groups in Smart Grid [PDF]
With the rapid evolution of smart grids, secure and efficient data communication among hierarchical sensor devices has become critical to ensure privacy and system integrity.
Yun Feng +4 more
doaj +2 more sources
Access Control Development Within the Framework of an IOTA-Based Electronic Medical Record Management System [PDF]
Electronic Medical Records (EMRs) are mandatory in Indonesia following the Ministry of Health regulation, which raises significant challenges in data security and patient-centric access control.
Hari Purnama +5 more
doaj +2 more sources
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the ...
Kwangsu Lee
doaj +1 more source
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that provides the efficient key revocation function by broadcasting an update key per each time period. Many RHIBE schemes have been proposed by combining an HIBE scheme and
Kwangsu Lee, Joon Sik Kim
doaj +1 more source
DLIN Encryption-based Auditable Privacy-Preserving Scheme for Consortium Blockchain [PDF]
As a decentralized distributed database,blockchain,with its unique consensus mechanism,allows nodes to establish point-to-point value transfer without relying on third parties.Therefore,it is widely used in finance,digital rights,and other fields.However,
HE Jianjiang, CHEN Yuling
doaj +1 more source
HIBE Scheme Based on Programmable Hash Function on Lattices [PDF]
To address the computational complexity of trapdoor generation of Hierarchical Identity-Based Encryption(HIBE) scheme on lattices under the standard mode,this paper proposes a HIBE scheme based on programmable hash function.First,the trapdoor is ...
YE Qing, WANG Mingming, TANG Yongli, QIN Panke, WANG Yongjun
doaj +1 more source
To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of ...
Xuewang ZHANG, Zhihong LI, Jinzhao LIN
doaj +2 more sources
Network marketing is a trading technique that provides companies with the opportunity to increase sales. With the increasing number of Internet-based purchases, several threats are increasingly observed in this field, such as user privacy violations ...
Saeed Banaeian Far +2 more
doaj +1 more source
Forward-secure hierarchical predicate encryption [PDF]
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan +2 more
core +2 more sources

