Results 1 to 10 of about 20,722 (263)

Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters. [PDF]

open access: yesPLoS ONE, 2018
Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted a lot of attention in recent years, many RHIBE ...
Qianqian Xing   +3 more
doaj   +2 more sources

Identity-Based Efficient Secure Data Communication Protocol for Hierarchical Sensor Groups in Smart Grid [PDF]

open access: yesSensors
With the rapid evolution of smart grids, secure and efficient data communication among hierarchical sensor devices has become critical to ensure privacy and system integrity.
Yun Feng   +4 more
doaj   +2 more sources

Access Control Development Within the Framework of an IOTA-Based Electronic Medical Record Management System [PDF]

open access: yesSensors
Electronic Medical Records (EMRs) are mandatory in Indonesia following the Ministry of Health regulation, which raises significant challenges in data security and patient-centric access control.
Hari Purnama   +5 more
doaj   +2 more sources

Delegate and Verify the Update Keys of Revocable Identity-Based Encryption

open access: yesIEEE Access, 2023
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the ...
Kwangsu Lee
doaj   +1 more source

A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption

open access: yesIEEE Access, 2022
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that provides the efficient key revocation function by broadcasting an update key per each time period. Many RHIBE schemes have been proposed by combining an HIBE scheme and
Kwangsu Lee, Joon Sik Kim
doaj   +1 more source

DLIN Encryption-based Auditable Privacy-Preserving Scheme for Consortium Blockchain [PDF]

open access: yesJisuanji gongcheng, 2023
As a decentralized distributed database,blockchain,with its unique consensus mechanism,allows nodes to establish point-to-point value transfer without relying on third parties.Therefore,it is widely used in finance,digital rights,and other fields.However,
HE Jianjiang, CHEN Yuling
doaj   +1 more source

HIBE Scheme Based on Programmable Hash Function on Lattices [PDF]

open access: yesJisuanji gongcheng, 2020
To address the computational complexity of trapdoor generation of Hierarchical Identity-Based Encryption(HIBE) scheme on lattices under the standard mode,this paper proposes a HIBE scheme based on programmable hash function.First,the trapdoor is ...
YE Qing, WANG Mingming, TANG Yongli, QIN Panke, WANG Yongjun
doaj   +1 more source

Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain

open access: yesTongxin xuebao, 2022
To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of ...
Xuewang ZHANG, Zhihong LI, Jinzhao LIN
doaj   +2 more sources

ACR-MLM: a privacy-preserving framework for anonymous and confidential rewarding in blockchain-based multi-level marketing

open access: yesData Science and Management, 2022
Network marketing is a trading technique that provides companies with the opportunity to increase sales. With the increasing number of Internet-based purchases, several threats are increasingly observed in this field, such as user privacy violations ...
Saeed Banaeian Far   +2 more
doaj   +1 more source

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy