Results 11 to 20 of about 20,722 (263)

Revocable hierarchical identity-based broadcast encryption

open access: yesTsinghua Science and Technology, 2018
Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of users while only intended users can decrypt. However, current HIBBE schemes do not support efficient revocation of private keys.
Dawei Li   +4 more
openaire   +3 more sources

Novel hierarchical identity-based encryption scheme from lattice

open access: yesTongxin xuebao, 2017
Aiming at the high complexity in user’s private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption (HIBE) schemes,a new HIBE scheme was proposed.The implicit extension method to improve preimage ...
Qing YE   +4 more
doaj   +3 more sources

Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly   +2 more
doaj   +2 more sources

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption [PDF]

open access: yesTheoretical Computer Science, 2015
Revocable Hierarchical Identity-Based Encryption (RHIBE) is a variant of Identity-Based Encryption (IBE), which enables the dynamic user management; a Key Generation Center (KGC) of a usual IBE has a key issuing ability. In contrast, in a RHIBE, a KGC can revoke compromised secret keys and even delegate both key issuing ability and revocation ability.
Jae Hong Seo, Keita Emura
  +8 more sources

Tightly Secure Hierarchical Identity-Based Encryption [PDF]

open access: yesJournal of Cryptology, 2019
AbstractWe construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length.The
Langrehr, R., Pan, J.
openaire   +5 more sources

Generalized Key Delegation for Hierarchical Identity-Based Encryption [PDF]

open access: yesIET Information Security, 2007
This paper introduces a new primitive called identity-based encryption with wildcard key derivation (WKD-IBE or 'wicked IBE') that enhances the concept of hierarchical identity-based encryption by allowing more general key delegation patterns. A secret key is derived for a vector of identity strings, where entries can be left blank using a wildcard ...
Abdalla, Michel   +2 more
openaire   +4 more sources

Timed-Release Hierarchical Identity-Based Encryption [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2014
We propose a notion of hierarchical identity-based encryption (HIBE) scheme with timed-release encryption (TRE) mechanism, timed-release hierarchical identity-based encryption (TRHIBE), and define its security models. We also show a generic construction of TRHIBE from HIBE and one-time signature, and discuss the security of the constructed scheme.
Toru Oshikiri, Taiichi Saito
openaire   +1 more source

A User Behavior Measurement Method Based on Trusted Cryptography Module [PDF]

open access: yesJisuanji gongcheng, 2017
In order to meet the high level security requirement of specific application areas,based on domestic basic software and hardware platform,a user behavior measurement method is proposed.Through the combination of USBKey dual factor authentication ...
HU Jipeng,TAN Li,YANG Minghua,ZHANG Yaming
doaj   +1 more source

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

A generic construction for revocable identity-based encryption with subset difference methods.

open access: yesPLoS ONE, 2020
To deal with dynamically changing user's credentials in identity-based encryption (IBE), providing an efficient key revocation method is a very important issue.
Kwangsu Lee
doaj   +2 more sources

Home - About - Disclaimer - Privacy