Results 251 to 260 of about 38,037 (283)

Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption

open access: closedInternational Symposium on Emerging Information Security and Applications, 2022
Anushree Belel   +2 more
openalex   +2 more sources

Server-Aided Hierarchical Identity-Based Encryption

2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Hierarchical Identity-Based Encryption (HIBE) system is an important cryptographic tools. However, one of the main efficiency drawbacks of HIBE is that the computational cost during encryption phase grows with the depth of identity. Thus, before widely deployed, it is an increasing need to improve its efficiency.
Jin Li, Dongqing Xie, Xiaofeng Chen
openaire   +1 more source

Hierarchical Identity-Based Broadcast Encryption

2014
We elaborate Hierarchical Identity-Based Encryption (HIBE) with a new primitive referred to as Hierarchical Identity-Based Broadcast Encryption (HIBBE). Similar to HIBE, HIBBE organizes users in a tree-like structure and users can delegate their decryption capability to their subordinates, which mirrors hierarchical social organizations in the real ...
Weiran Liu   +3 more
openaire   +1 more source

Identity-Based Encryption and Hierarchical Identity-Based Encryption

2009
We take a bird's eye view of different identity-based encryption (IBE) and hierarchical identity-based encryption (HIBE) protocols that are available in the literature and use bilinear pairing as the principal building block. We start with the seminal work on IBE by Boneh-Franklin.
Chatterjee Sanjit, Sarkar Palash
openaire   +1 more source

Revocable-Hierarchical-Identity-Based Inner Product Function Encryption in Smart Healthcare

IEEE Internet of Things Journal
With the development of cloud computing and the digital transformation of the medical industry, the application scenarios and effects of smart healthcare are constantly expanding and improving.
Yasi Zhu   +4 more
semanticscholar   +1 more source

Role-Based Access Control, Secure Multi-Party Computation, and Hierarchical Identity-Based Encryption: Combining AI to Improve Mobile Healthcare Security

2024 International Conference on Emerging Research in Computational Science (ICERCS)
Background Patient data is sensitive and its demand for privacy creates specific security challenges for mobile healthcare systems. The research explores the secure and scalable applications of AI-based strategies in combination with Hierarchical ...
M. Sareddy, Shakir Khan
semanticscholar   +1 more source

HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES

International Journal of Foundations of Computer Science, 2010
In a proxy re-encryption scheme, a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in public key settings. Hierarchical identity-based cryptography is a generalization of identity-based encryption that mirrors an organizational hierarchy ...
Ren, Yanli   +3 more
openaire   +2 more sources

Private Key Management in Hierarchical Identity-Based Encryption

2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Hierarchical identity-based encryption (HIBE) is a generalization of IBE that mirrors an organizational hierarchy, which consists of a root private key generator (PKG), domain PKGs and users. In a traditional HIBE system, users retrieve private keys from their domain PKGs, while domain PKGs request domain secret keys from the root PKG. What's more, the
Zhongren Liu   +3 more
openaire   +1 more source

Research of hierarchical identity-based encryption for grid

open access: closedJournal of Computer Applications, 2008
Jiang Wai-wen
openaire   +2 more sources

A Hierarchical Identity-Based Encryption for MANETs

2011 International Conference on Computational Problem-Solving (ICCP), 2011
Mobile ad-hoc networks (MANETs) have no fixed infrastructure such as base stations or mobile switching centers, and the framework is dynamic owing to frequent changes in both topology and membership. Consequently, the trust relationships among nodes also change, and many security solutions with static configurations will become inadequate.
openaire   +1 more source

Home - About - Disclaimer - Privacy