Results 261 to 270 of about 38,037 (283)
Some of the next articles are maybe not open access.

Adaptively Secure Hierarchical Identity-Based Encryption over Lattice

2017
Quantum computer is regarded as a threat to the cryptosystem at present. Lattice with a rich mathematics structure gave a choice for building post-quantum secure hierarchical identity-based encryption (HIBE) system. But in the existing works, there are many shortcomings such as large public/private key space and weak security model.
Leyou Zhang, Qing Wu
openaire   +1 more source

Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

International Journal of Information Security, 2017
Hierarchical identity-based encryption is an important extension from IBE and has found many applications in the network world. Private key revocation is a crucial requirement for any public key system. In this paper, we propose a novel revocation method for the hierarchical identity-based encryption.
Hongyong Jia   +4 more
openaire   +1 more source

An Efficient Wildcarded Identity-Based Encryption Scheme

J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
In the Identity-based encryption (IBE) scheme user’s public key is exactly the user’s identity, it thus doesn’t need to use expensive certificates in certified public key cryptography.
Xuan Lam Le, L. Bui, V. Trinh
semanticscholar   +1 more source

Ring-LWE Identity-Based Encryption with Dynamic Revocation for Cloud Data Sharing

Indian Journal of Cryptography and Network Security
Cloud storage faces significant security and access control challenges due to reduced user oversight and the emerging threat of quantum computing to traditional cryptographic methods. Existing revocable Identity-Based Encryption (IBE) schemes are limited
Gabriel Assamah   +4 more
semanticscholar   +1 more source

New Escrow-Free Scheme for Hierarchical Identity-Based Encryption

2015
Key escrow is an inherent problem in identity-based encryption IBE since it was first proposed by Shamir in 1984. We present a new scheme to remove key escrow from IBE and HIBE, based on the security notion of anonymous ciphertext indistinguishability against key generation center ACI-KGC proposed by Chow.
Fang Qi, Xin Tang, Quanyun Wei
openaire   +1 more source

Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security

IACR Cryptology ePrint Archive, 2020
Roman Langrehr, Jiaxin Pan
semanticscholar   +1 more source

Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups

2012
A hierarchical identity-based encryption (HIBE) scheme is called anonymous if the ciphertext does not leak the identity of the recipient. Currently, anonymous HIBE schemes are constructed in composite order groups or achieve selective-ID security in prime order groups and the ciphertext size is linear in the maximum depth of hierarchy.
Yanli Ren, Shuozhong Wang, Xinpeng Zhang
openaire   +1 more source

Home - About - Disclaimer - Privacy