Results 11 to 20 of about 38,037 (283)
The evolution of traditional power grids into smart grids has enabled two-way Internet of Things (IoT)-based communication between utilities and devices or consumers, improving energy distribution and efficient service to the end-users.
Naveen Tatipatri, S. L. Arun
doaj +3 more sources
Hierarchical Identity-Based Matchmaking Encryption
Sohto Chiku, Keisuke Hara, Junji Shikata
semanticscholar +4 more sources
Efficient Hierarchical Identity-Based Encryption for Mobile Ad Hoc Networks [PDF]
A Mobile Ad-hoc Network (MANET) is a collection of wireless nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure. Such networks are more vulnerable to security attacks than conventional wired networks, and hence cryptographic schemes are usually used to ensure security for them ...
He, Kai +4 more
+6 more sources
Toward Hierarchical Identity-Based Encryption [PDF]
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and mention some applications. A two-level HIBE (2-HIBE) scheme consists of a root private key generator (PKG), domain PKGs and users, all of which are associated with primitive IDs (PIDs) that are arbitrary strings.
Jeremy Horwitz, Ben Lynn
openaire +2 more sources
Hierarchical Identity Based Encryption with Polynomially Many Levels [PDF]
We present the first hierarchical identity based encryption (HIBE) system that has full security for more than a constant number of levels. In all prior HIBE systems in the literature, the security reductions suffered from exponential degradation in the depth of the hierarchy, so these systems were only proven fully secure for identity hierarchies of ...
Craig Gentry, Shai Halevi
openaire +3 more sources
Hierarchical Identity Based Encryption with Constant Size Ciphertext [PDF]
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, regardless of the hierarchy depth. Encryption is as efficient as in other HIBE systems.
Dan Boneh, Xavier Boyen, Eu-Jin Goh
openaire +2 more sources
Survey on Identity based and Hierarchical Identity based Encryption Schemes
this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based cryptography, an overview of its development process and research progress. We
R. Sridevi, D. Kalyani
openaire +2 more sources
(Hierarchical) Identity-Based Encryption from Affine Message Authentication [PDF]
We provide a generic transformation from any affine message authentication code (MAC) to an identity-based encryption (IBE) scheme over pairing groups of prime order. If the MAC satisfies a security notion related to unforgeability against chosen-message attacks and, for example, the k-Linear assumption holds, then the resulting IBE scheme is ...
Blazy, Olivier, Kiltz, Eike, Pan, Jiaxin
openaire +3 more sources
Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience [PDF]
The adversary is able to obtain some secret information from side channel attacks, which further damages the security for the system. To resolve this issue, we provide a hierarchical identity-based online/offline encryption scheme which resists side ...
Qihong Yu, Jiguo Li, Sai Ji
openalex +2 more sources
Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
Hierarchical Identity-Based Encryption (HIBE) is a generalization of identity-based encryption that mirrors an organizational hierarchy, and allows the root Private Key Generator (PKG) to distribute the workload of key generations to lower-level PKGs. In Indocrypt'08, Ren and Gu proposed a new HIBE scheme, and claimed that their scheme is fully chosen ...
WENG, Jian +3 more
openaire +4 more sources

