Results 221 to 230 of about 20,722 (263)
Some of the next articles are maybe not open access.

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption

Information Sciences, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shao, Jun, Cao, Zhenfu
openaire   +4 more sources

Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
We propose an anonymous Hierarchical Identity-Based Encryption (anonymous HIBE) scheme with short ciphertexts. Prior to our work, most anonymous HIBE schemes have long ciphertexts increased according to the hierarchical depth of recipient. The size of the ciphertext in our scheme does not depend on the depth of the hierarchy.
Jae Hong SEO   +3 more
openaire   +3 more sources

Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

International Journal of Information Security, 2017
Hierarchical identity-based encryption is an important extension from IBE and has found many applications in the network world. Private key revocation is a crucial requirement for any public key system. In this paper, we propose a novel revocation method for the hierarchical identity-based encryption.
Hongyong Jia   +4 more
openaire   +3 more sources

Hierarchical identity-based inner product functional encryption

Information Sciences, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Song, Ge   +5 more
openaire   +1 more source

HIBE: Hierarchical Identity-Based Encryption

2021
Cryptosystems fundamentally deal with the issue of securing data communication. Public key infrastructure (PKI) model requires an authenticated public key for encryption that has to be obtained prior to initiating communication. The identity-based encryption (IBE) essentially removes the public key distribution by using an arbitrary string, e.g., an ...
Tawseef Ahmed Teli   +2 more
openaire   +1 more source

Server-Aided Hierarchical Identity-Based Encryption

2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Hierarchical Identity-Based Encryption (HIBE) system is an important cryptographic tools. However, one of the main efficiency drawbacks of HIBE is that the computational cost during encryption phase grows with the depth of identity. Thus, before widely deployed, it is an increasing need to improve its efficiency.
Jin Li, Dongqing Xie, Xiaofeng Chen
openaire   +1 more source

Hierarchical Identity-Based Broadcast Encryption

2014
We elaborate Hierarchical Identity-Based Encryption (HIBE) with a new primitive referred to as Hierarchical Identity-Based Broadcast Encryption (HIBBE). Similar to HIBE, HIBBE organizes users in a tree-like structure and users can delegate their decryption capability to their subordinates, which mirrors hierarchical social organizations in the real ...
Weiran Liu   +3 more
openaire   +1 more source

Identity-Based Encryption and Hierarchical Identity-Based Encryption

2009
We take a bird's eye view of different identity-based encryption (IBE) and hierarchical identity-based encryption (HIBE) protocols that are available in the literature and use bilinear pairing as the principal building block. We start with the seminal work on IBE by Boneh-Franklin.
Chatterjee Sanjit, Sarkar Palash
openaire   +1 more source

Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity

International Journal of Foundations of Computer Science, 2019
As a promising public key cryptographic primitive, hierarchical identity-based encryption (HIBE) introduces key delegation mechanisms into identity-based encryption. However, key leakage and recipient anonymity issues have not been adequately addressed in HIBE. Hence, direct applications of traditional HIBE schemes will violate data security and abuse
Zhang, Yinghui   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy