Results 11 to 20 of about 38,037 (283)

Performance Analysis of Non-Pairing Hierarchical Identity-Based Encryption in Active Distribution System

open access: goldIEEE Access
The evolution of traditional power grids into smart grids has enabled two-way Internet of Things (IoT)-based communication between utilities and devices or consumers, improving energy distribution and efficient service to the end-users.
Naveen Tatipatri, S. L. Arun
doaj   +3 more sources

Efficient Hierarchical Identity-Based Encryption for Mobile Ad Hoc Networks [PDF]

open access: hybridMobile Information Systems, 2014
A Mobile Ad-hoc Network (MANET) is a collection of wireless nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure. Such networks are more vulnerable to security attacks than conventional wired networks, and hence cryptographic schemes are usually used to ensure security for them ...
He, Kai   +4 more
  +6 more sources

Toward Hierarchical Identity-Based Encryption [PDF]

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 2002
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and mention some applications. A two-level HIBE (2-HIBE) scheme consists of a root private key generator (PKG), domain PKGs and users, all of which are associated with primitive IDs (PIDs) that are arbitrary strings.
Jeremy Horwitz, Ben Lynn
openaire   +2 more sources

Hierarchical Identity Based Encryption with Polynomially Many Levels [PDF]

open access: bronze, 2009
We present the first hierarchical identity based encryption (HIBE) system that has full security for more than a constant number of levels. In all prior HIBE systems in the literature, the security reductions suffered from exponential degradation in the depth of the hierarchy, so these systems were only proven fully secure for identity hierarchies of ...
Craig Gentry, Shai Halevi
openaire   +3 more sources

Hierarchical Identity Based Encryption with Constant Size Ciphertext [PDF]

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 2005
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, regardless of the hierarchy depth. Encryption is as efficient as in other HIBE systems.
Dan Boneh, Xavier Boyen, Eu-Jin Goh
openaire   +2 more sources

Survey on Identity based and Hierarchical Identity based Encryption Schemes

open access: bronzeInternational Journal of Computer Applications, 2016
this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based cryptography, an overview of its development process and research progress. We
R. Sridevi, D. Kalyani
openaire   +2 more sources

(Hierarchical) Identity-Based Encryption from Affine Message Authentication [PDF]

open access: gold, 2014
We provide a generic transformation from any affine message authentication code (MAC) to an identity-based encryption (IBE) scheme over pairing groups of prime order. If the MAC satisfies a security notion related to unforgeability against chosen-message attacks and, for example, the k-Linear assumption holds, then the resulting IBE scheme is ...
Blazy, Olivier, Kiltz, Eike, Pan, Jiaxin
openaire   +3 more sources

Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience [PDF]

open access: hybridSecurity and Communication Networks, 2022
The adversary is able to obtain some secret information from side channel attacks, which further damages the security for the system. To resolve this issue, we provide a hierarchical identity-based online/offline encryption scheme which resists side ...
Qihong Yu, Jiguo Li, Sai Ji
openalex   +2 more sources

Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme

open access: greenIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010
Hierarchical Identity-Based Encryption (HIBE) is a generalization of identity-based encryption that mirrors an organizational hierarchy, and allows the root Private Key Generator (PKG) to distribute the workload of key generations to lower-level PKGs. In Indocrypt'08, Ren and Gu proposed a new HIBE scheme, and claimed that their scheme is fully chosen ...
WENG, Jian   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy