Results 11 to 20 of about 20,722 (263)
Revocable hierarchical identity-based broadcast encryption
Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of users while only intended users can decrypt. However, current HIBBE schemes do not support efficient revocation of private keys.
Dawei Li +4 more
openaire +3 more sources
Novel hierarchical identity-based encryption scheme from lattice
Aiming at the high complexity in user’s private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption (HIBE) schemes,a new HIBE scheme was proposed.The implicit extension method to improve preimage ...
Qing YE +4 more
doaj +3 more sources
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly +2 more
doaj +2 more sources
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption [PDF]
Revocable Hierarchical Identity-Based Encryption (RHIBE) is a variant of Identity-Based Encryption (IBE), which enables the dynamic user management; a Key Generation Center (KGC) of a usual IBE has a key issuing ability. In contrast, in a RHIBE, a KGC can revoke compromised secret keys and even delegate both key issuing ability and revocation ability.
Jae Hong Seo, Keita Emura
+8 more sources
Tightly Secure Hierarchical Identity-Based Encryption [PDF]
AbstractWe construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length.The
Langrehr, R., Pan, J.
openaire +5 more sources
Generalized Key Delegation for Hierarchical Identity-Based Encryption [PDF]
This paper introduces a new primitive called identity-based encryption with wildcard key derivation (WKD-IBE or 'wicked IBE') that enhances the concept of hierarchical identity-based encryption by allowing more general key delegation patterns. A secret key is derived for a vector of identity strings, where entries can be left blank using a wildcard ...
Abdalla, Michel +2 more
openaire +4 more sources
Timed-Release Hierarchical Identity-Based Encryption [PDF]
We propose a notion of hierarchical identity-based encryption (HIBE) scheme with timed-release encryption (TRE) mechanism, timed-release hierarchical identity-based encryption (TRHIBE), and define its security models. We also show a generic construction of TRHIBE from HIBE and one-time signature, and discuss the security of the constructed scheme.
Toru Oshikiri, Taiichi Saito
openaire +1 more source
A User Behavior Measurement Method Based on Trusted Cryptography Module [PDF]
In order to meet the high level security requirement of specific application areas,based on domestic basic software and hardware platform,a user behavior measurement method is proposed.Through the combination of USBKey dual factor authentication ...
HU Jipeng,TAN Li,YANG Minghua,ZHANG Yaming
doaj +1 more source
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram +2 more
core +2 more sources
A generic construction for revocable identity-based encryption with subset difference methods.
To deal with dynamically changing user's credentials in identity-based encryption (IBE), providing an efficient key revocation method is a very important issue.
Kwangsu Lee
doaj +2 more sources

