Results 21 to 30 of about 38,037 (283)
Access Control Development Within the Framework of an IOTA-Based Electronic Medical Record Management System [PDF]
Electronic Medical Records (EMRs) are mandatory in Indonesia following the Ministry of Health regulation, which raises significant challenges in data security and patient-centric access control.
Hari Purnama +5 more
doaj +2 more sources
Novel hierarchical identity-based encryption scheme from lattice
Aiming at the high complexity in user’s private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption (HIBE) schemes,a new HIBE scheme was proposed.The implicit extension method to improve preimage ...
Qing YE +4 more
doaj +3 more sources
Hierarchical identity-based broadcast encryption scheme from LWE
A hierarchical identity-based broadcast encryption (H-IBBE) scheme is an identity-based broadcast encryption (IBBE) scheme in a hierarchical environment. In order to obtain secure H-IBBE schemes in the quantum era, we propose an H-IBBE scheme based on the learning with errors problem assumption.
Chunli Yang +4 more
openaire +2 more sources
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) [PDF]
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with small ciphertexts of size linear in the depth of the hierarchy ...
Xavier Boyen, Brent Waters
openaire +2 more sources
Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption
By dividing encryption as online and offline stages, the online/offline encryption schemes are very suitable to lightweight equipment. For the offline stage, high-performance equipment is used for complex preprocessing calculation, and the online stage
Qihong Yu Qihong Yu +3 more
openalex +3 more sources
Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure [PDF]
Security is a main concern for the Internet of Things (IoT) infrastructure as large volumes of data are collected and processed in the systems. Due to the limited resources of interconnected sensors and devices in the IoT systems, efficiency is one of ...
Lifeng Guo, Jing Wang, Wei‐Chuen Yau
openalex +2 more sources
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the ...
Kwangsu Lee
doaj +1 more source
DLIN Encryption-based Auditable Privacy-Preserving Scheme for Consortium Blockchain [PDF]
As a decentralized distributed database,blockchain,with its unique consensus mechanism,allows nodes to establish point-to-point value transfer without relying on third parties.Therefore,it is widely used in finance,digital rights,and other fields.However,
HE Jianjiang, CHEN Yuling
doaj +1 more source
HIBE Scheme Based on Programmable Hash Function on Lattices [PDF]
To address the computational complexity of trapdoor generation of Hierarchical Identity-Based Encryption(HIBE) scheme on lattices under the standard mode,this paper proposes a HIBE scheme based on programmable hash function.First,the trapdoor is ...
YE Qing, WANG Mingming, TANG Yongli, QIN Panke, WANG Yongjun
doaj +1 more source
To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of ...
Xuewang ZHANG, Zhihong LI, Jinzhao LIN
doaj +2 more sources

