Results 231 to 240 of about 38,037 (283)
An IoT based remote medical diagnosis system using one time pad cipher over MQTT protocol. [PDF]
Kumar NR +5 more
europepmc +1 more source
A MARL-federated blockchain-based quantum secure framework for trust management in industrial internet of things. [PDF]
Alandjani G.
europepmc +1 more source
A Note on Adaptive Security in Hierarchical Identity-Based Encryption
We present the first construction for adaptively secure HIBE, that does not rely on bilinear pairings or random oracle heuristics. Notably, we design an adaptively secure HIBE from any selectively secure IBE system in the standard model. Combining this with known results, this gives the first adaptively secure HIBE system from a wide variety of ...
Goyal, Rishab +2 more
semanticscholar +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Hierarchical identity-based inner product functional encryption
Information Sciences, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Song, Ge +5 more
openaire +2 more sources
HIBE: Hierarchical Identity-Based Encryption
Functional Encryption, 2021Cryptosystems fundamentally deal with the issue of securing data communication. Public key infrastructure (PKI) model requires an authenticated public key for encryption that has to be obtained prior to initiating communication. The identity-based encryption (IBE) essentially removes the public key distribution by using an arbitrary string, e.g., an ...
Tawseef Ahmed Teli +2 more
openaire +2 more sources
Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth
Anushree Belel +2 more
semanticscholar +3 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shao, Jun, Cao, Zhenfu
openaire +3 more sources
Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
International Journal of Foundations of Computer Science, 2019As a promising public key cryptographic primitive, hierarchical identity-based encryption (HIBE) introduces key delegation mechanisms into identity-based encryption. However, key leakage and recipient anonymity issues have not been adequately addressed in HIBE. Hence, direct applications of traditional HIBE schemes will violate data security and abuse
Zhang, Yinghui +5 more
openaire +2 more sources

