Results 21 to 30 of about 38,037 (283)

Access Control Development Within the Framework of an IOTA-Based Electronic Medical Record Management System [PDF]

open access: yesSensors
Electronic Medical Records (EMRs) are mandatory in Indonesia following the Ministry of Health regulation, which raises significant challenges in data security and patient-centric access control.
Hari Purnama   +5 more
doaj   +2 more sources

Novel hierarchical identity-based encryption scheme from lattice

open access: yesTongxin xuebao, 2017
Aiming at the high complexity in user’s private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption (HIBE) schemes,a new HIBE scheme was proposed.The implicit extension method to improve preimage ...
Qing YE   +4 more
doaj   +3 more sources

Hierarchical identity-based broadcast encryption scheme from LWE

open access: closedJournal of Communications and Networks, 2014
A hierarchical identity-based broadcast encryption (H-IBBE) scheme is an identity-based broadcast encryption (IBBE) scheme in a hierarchical environment. In order to obtain secure H-IBBE schemes in the quantum era, we propose an H-IBBE scheme based on the learning with errors problem assumption.
Chunli Yang   +4 more
openaire   +2 more sources

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) [PDF]

open access: yesAnnual International Cryptology Conference, 2006
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with small ciphertexts of size linear in the depth of the hierarchy ...
Xavier Boyen, Brent Waters
openaire   +2 more sources

Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption

open access: bronze網際網路技術學刊, 2022
By dividing encryption as online and offline stages, the online/offline encryption schemes are very suitable to lightweight equipment. For the offline stage, high-performance equipment is used for complex preprocessing calculation, and the online stage
Qihong Yu Qihong Yu   +3 more
openalex   +3 more sources

Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure [PDF]

open access: goldSymmetry, 2019
Security is a main concern for the Internet of Things (IoT) infrastructure as large volumes of data are collected and processed in the systems. Due to the limited resources of interconnected sensors and devices in the IoT systems, efficiency is one of ...
Lifeng Guo, Jing Wang, Wei‐Chuen Yau
openalex   +2 more sources

Delegate and Verify the Update Keys of Revocable Identity-Based Encryption

open access: yesIEEE Access, 2023
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the ...
Kwangsu Lee
doaj   +1 more source

DLIN Encryption-based Auditable Privacy-Preserving Scheme for Consortium Blockchain [PDF]

open access: yesJisuanji gongcheng, 2023
As a decentralized distributed database,blockchain,with its unique consensus mechanism,allows nodes to establish point-to-point value transfer without relying on third parties.Therefore,it is widely used in finance,digital rights,and other fields.However,
HE Jianjiang, CHEN Yuling
doaj   +1 more source

HIBE Scheme Based on Programmable Hash Function on Lattices [PDF]

open access: yesJisuanji gongcheng, 2020
To address the computational complexity of trapdoor generation of Hierarchical Identity-Based Encryption(HIBE) scheme on lattices under the standard mode,this paper proposes a HIBE scheme based on programmable hash function.First,the trapdoor is ...
YE Qing, WANG Mingming, TANG Yongli, QIN Panke, WANG Yongjun
doaj   +1 more source

Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain

open access: yesTongxin xuebao, 2022
To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of ...
Xuewang ZHANG, Zhihong LI, Jinzhao LIN
doaj   +2 more sources

Home - About - Disclaimer - Privacy