Results 261 to 270 of about 38,037 (283)
Some of the next articles are maybe not open access.
Adaptively Secure Hierarchical Identity-Based Encryption over Lattice
2017Quantum computer is regarded as a threat to the cryptosystem at present. Lattice with a rich mathematics structure gave a choice for building post-quantum secure hierarchical identity-based encryption (HIBE) system. But in the existing works, there are many shortcomings such as large public/private key space and weak security model.
Leyou Zhang, Qing Wu
openaire +1 more source
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
International Journal of Information Security, 2017Hierarchical identity-based encryption is an important extension from IBE and has found many applications in the network world. Private key revocation is a crucial requirement for any public key system. In this paper, we propose a novel revocation method for the hierarchical identity-based encryption.
Hongyong Jia +4 more
openaire +1 more source
An Efficient Wildcarded Identity-Based Encryption Scheme
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.In the Identity-based encryption (IBE) scheme user’s public key is exactly the user’s identity, it thus doesn’t need to use expensive certificates in certified public key cryptography.
Xuan Lam Le, L. Bui, V. Trinh
semanticscholar +1 more source
Ring-LWE Identity-Based Encryption with Dynamic Revocation for Cloud Data Sharing
Indian Journal of Cryptography and Network SecurityCloud storage faces significant security and access control challenges due to reduced user oversight and the emerging threat of quantum computing to traditional cryptographic methods. Existing revocable Identity-Based Encryption (IBE) schemes are limited
Gabriel Assamah +4 more
semanticscholar +1 more source
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities
Comput. Stand. Interfaces, 2022N. Nguyen, M. Pham
semanticscholar +1 more source
New Escrow-Free Scheme for Hierarchical Identity-Based Encryption
2015Key escrow is an inherent problem in identity-based encryption IBE since it was first proposed by Shamir in 1984. We present a new scheme to remove key escrow from IBE and HIBE, based on the security notion of anonymous ciphertext indistinguishability against key generation center ACI-KGC proposed by Chow.
Fang Qi, Xin Tang, Quanyun Wei
openaire +1 more source
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security
IACR Cryptology ePrint Archive, 2020Roman Langrehr, Jiaxin Pan
semanticscholar +1 more source
Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups
2012A hierarchical identity-based encryption (HIBE) scheme is called anonymous if the ciphertext does not leak the identity of the recipient. Currently, anonymous HIBE schemes are constructed in composite order groups or achieve selective-ID security in prime order groups and the ciphertext size is linear in the maximum depth of hierarchy.
Yanli Ren, Shuozhong Wang, Xinpeng Zhang
openaire +1 more source
Hierarchical Identity-Based Conditional Proxy Re-encryption Scheme Based RLWE and NTRU Variant
ICPCSEE, 2021Chao Wang +3 more
semanticscholar +1 more source

