Results 251 to 260 of about 38,037 (283)
Anushree Belel +2 more
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Server-Aided Hierarchical Identity-Based Encryption
2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013Hierarchical Identity-Based Encryption (HIBE) system is an important cryptographic tools. However, one of the main efficiency drawbacks of HIBE is that the computational cost during encryption phase grows with the depth of identity. Thus, before widely deployed, it is an increasing need to improve its efficiency.
Jin Li, Dongqing Xie, Xiaofeng Chen
openaire +1 more source
Hierarchical Identity-Based Broadcast Encryption
2014We elaborate Hierarchical Identity-Based Encryption (HIBE) with a new primitive referred to as Hierarchical Identity-Based Broadcast Encryption (HIBBE). Similar to HIBE, HIBBE organizes users in a tree-like structure and users can delegate their decryption capability to their subordinates, which mirrors hierarchical social organizations in the real ...
Weiran Liu +3 more
openaire +1 more source
Identity-Based Encryption and Hierarchical Identity-Based Encryption
2009We take a bird's eye view of different identity-based encryption (IBE) and hierarchical identity-based encryption (HIBE) protocols that are available in the literature and use bilinear pairing as the principal building block. We start with the seminal work on IBE by Boneh-Franklin.
Chatterjee Sanjit, Sarkar Palash
openaire +1 more source
Revocable-Hierarchical-Identity-Based Inner Product Function Encryption in Smart Healthcare
IEEE Internet of Things JournalWith the development of cloud computing and the digital transformation of the medical industry, the application scenarios and effects of smart healthcare are constantly expanding and improving.
Yasi Zhu +4 more
semanticscholar +1 more source
2024 International Conference on Emerging Research in Computational Science (ICERCS)
Background Patient data is sensitive and its demand for privacy creates specific security challenges for mobile healthcare systems. The research explores the secure and scalable applications of AI-based strategies in combination with Hierarchical ...
M. Sareddy, Shakir Khan
semanticscholar +1 more source
Background Patient data is sensitive and its demand for privacy creates specific security challenges for mobile healthcare systems. The research explores the secure and scalable applications of AI-based strategies in combination with Hierarchical ...
M. Sareddy, Shakir Khan
semanticscholar +1 more source
HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
International Journal of Foundations of Computer Science, 2010In a proxy re-encryption scheme, a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in public key settings. Hierarchical identity-based cryptography is a generalization of identity-based encryption that mirrors an organizational hierarchy ...
Ren, Yanli +3 more
openaire +2 more sources
Private Key Management in Hierarchical Identity-Based Encryption
2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007Hierarchical identity-based encryption (HIBE) is a generalization of IBE that mirrors an organizational hierarchy, which consists of a root private key generator (PKG), domain PKGs and users. In a traditional HIBE system, users retrieve private keys from their domain PKGs, while domain PKGs request domain secret keys from the root PKG. What's more, the
Zhongren Liu +3 more
openaire +1 more source
Research of hierarchical identity-based encryption for grid
Jiang Wai-wen
openaire +2 more sources
A Hierarchical Identity-Based Encryption for MANETs
2011 International Conference on Computational Problem-Solving (ICCP), 2011Mobile ad-hoc networks (MANETs) have no fixed infrastructure such as base stations or mobile switching centers, and the framework is dynamic owing to frequent changes in both topology and membership. Consequently, the trust relationships among nodes also change, and many security solutions with static configurations will become inadequate.
openaire +1 more source

