Edge-Based Blockchain Architecture for Event-Driven IoT using Hierarchical Identity Based Encryption
Information Processing and Management, 2021Deepa Pavithran, Jamal N Al-Karaki
exaly
A Note on Adaptive Security in Hierarchical Identity-Based Encryption
We present the first construction for adaptively secure HIBE, that does not rely on bilinear pairings or random oracle heuristics. Notably, we design an adaptively secure HIBE from any selectively secure IBE system in the standard model. Combining this with known results, this gives the first adaptively secure HIBE system from a wide variety of ...Goyal, Rishab +2 more
openaire +1 more source
Revocable hierarchical identity-based encryption with adaptive security
Theoretical Computer Science, 2021Kwangsu Lee
exaly
Anonymous hierarchical identity-based encryption without key delegation in decryption
International Journal of Embedded Systems, 2015Song Luo
exaly
Hierarchical identity-based encryption without key delegation in decryption
International Journal of Grid and Utility Computing, 2014Song Luo
exaly
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions
2023Huangting Wu, Sherman S. M. Chow
openaire +1 more source
Revocable hierarchical identity-based encryption with shorter private keys and update keys
Designs, Codes, and Cryptography, 2018Kwangsu Lee, Seunghwan Park
exaly
Hierarchical Identity-Based Matchmaking Encryption
Sohto Chiku, Keisuke Hara, Junji Shikataopenaire +1 more source
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities
Computer Standards and Interfaces, 2023exaly
Privacy-preserving identity-based broadcast encryption
Information Fusion, 2012Seong-Oun Hwang, Junbeom Hur
exaly

