Results 241 to 250 of about 38,037 (283)
Hierarchical Identity-based Broadcast Encryption Scheme on Lattices
In this paper, a hierarchical identity-based broadcast encryption scheme is proposed based on the learning with errors problem, which is a classic hard problem on lattices. In the proposed scheme, each user's identity is associated with a lattice matrix, then the relationship between the lattice and its sub lattice could easily represent the ...
Zhang Jinman, Chen Qin
openaire +2 more sources
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
We propose an anonymous Hierarchical Identity-Based Encryption (anonymous HIBE) scheme with short ciphertexts. Prior to our work, most anonymous HIBE schemes have long ciphertexts increased according to the hierarchical depth of recipient. The size of the ciphertext in our scheme does not depend on the depth of the hierarchy.
Jae Hong SEO +3 more
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Hierarchical Identity-Based Encryption
Modern Cryptography with Proof Techniques and Applications, 2021Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire +2 more sources
Hierarchical Identity-Based Encryption and Attribute-Based Encryption
Encyclopedia of Cryptography, Security and Privacy, 2021Qianhong Wu, Hua Deng
openaire +2 more sources
Edge-Based Blockchain Architecture for Event-Driven IoT using Hierarchical Identity Based Encryption
Information Processing & Management, 2021IoT (Internet of Things) sensors usually generate a large amount of data that is shared with a centralized cloud to provide various services. Traditional IoT architecture is heavily centralized, where data stored in a cloud environment is prone to ...
Deepa Pavithran +2 more
semanticscholar +1 more source
Anonymous Hierarchical Identity-based Encryption EHR Sharing Mechanism Based on SM9
2022 IEEE 21st International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS), 2022The identity-based encryption (IBE) scheme SM9 is a commercial encryption standard in China and has been used as a basic building block for authentication. Currently, to accommodate large-scale application scenarios, a variant hierarchical identity-based
Zuobin Ying +4 more
semanticscholar +1 more source
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions
International Conference on Applied Cryptography and Network Security, 2023Huangting Wu, Sherman S. M. Chow
openaire +2 more sources
ACM Asia Conference on Computer and Communications Security, 2022
Puncturable encryption (PE), introduced by Green and Miers at IEEE S$&$P 2015, allows recipients to update their decryption keys to revoke decryption capability for selected messages without communicating with senders.
Priyanka Dutta +5 more
semanticscholar +1 more source
Puncturable encryption (PE), introduced by Green and Miers at IEEE S$&$P 2015, allows recipients to update their decryption keys to revoke decryption capability for selected messages without communicating with senders.
Priyanka Dutta +5 more
semanticscholar +1 more source
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption
Yanyan Liu, Yiru Sun
openalex +2 more sources

