Results 221 to 230 of about 20,722 (263)
Some of the next articles are maybe not open access.
Information Sciences, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shao, Jun, Cao, Zhenfu
openaire +4 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shao, Jun, Cao, Zhenfu
openaire +4 more sources
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011We propose an anonymous Hierarchical Identity-Based Encryption (anonymous HIBE) scheme with short ciphertexts. Prior to our work, most anonymous HIBE schemes have long ciphertexts increased according to the hierarchical depth of recipient. The size of the ciphertext in our scheme does not depend on the depth of the hierarchy.
Jae Hong SEO +3 more
openaire +3 more sources
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
International Journal of Information Security, 2017Hierarchical identity-based encryption is an important extension from IBE and has found many applications in the network world. Private key revocation is a crucial requirement for any public key system. In this paper, we propose a novel revocation method for the hierarchical identity-based encryption.
Hongyong Jia +4 more
openaire +3 more sources
Hierarchical identity-based inner product functional encryption
Information Sciences, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Song, Ge +5 more
openaire +1 more source
HIBE: Hierarchical Identity-Based Encryption
2021Cryptosystems fundamentally deal with the issue of securing data communication. Public key infrastructure (PKI) model requires an authenticated public key for encryption that has to be obtained prior to initiating communication. The identity-based encryption (IBE) essentially removes the public key distribution by using an arbitrary string, e.g., an ...
Tawseef Ahmed Teli +2 more
openaire +1 more source
Server-Aided Hierarchical Identity-Based Encryption
2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013Hierarchical Identity-Based Encryption (HIBE) system is an important cryptographic tools. However, one of the main efficiency drawbacks of HIBE is that the computational cost during encryption phase grows with the depth of identity. Thus, before widely deployed, it is an increasing need to improve its efficiency.
Jin Li, Dongqing Xie, Xiaofeng Chen
openaire +1 more source
Hierarchical Identity-Based Broadcast Encryption
2014We elaborate Hierarchical Identity-Based Encryption (HIBE) with a new primitive referred to as Hierarchical Identity-Based Broadcast Encryption (HIBBE). Similar to HIBE, HIBBE organizes users in a tree-like structure and users can delegate their decryption capability to their subordinates, which mirrors hierarchical social organizations in the real ...
Weiran Liu +3 more
openaire +1 more source
Identity-Based Encryption and Hierarchical Identity-Based Encryption
2009We take a bird's eye view of different identity-based encryption (IBE) and hierarchical identity-based encryption (HIBE) protocols that are available in the literature and use bilinear pairing as the principal building block. We start with the seminal work on IBE by Boneh-Franklin.
Chatterjee Sanjit, Sarkar Palash
openaire +1 more source
Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
International Journal of Foundations of Computer Science, 2019As a promising public key cryptographic primitive, hierarchical identity-based encryption (HIBE) introduces key delegation mechanisms into identity-based encryption. However, key leakage and recipient anonymity issues have not been adequately addressed in HIBE. Hence, direct applications of traditional HIBE schemes will violate data security and abuse
Zhang, Yinghui +5 more
openaire +1 more source

