Results 1 to 10 of about 6,719 (236)

Backward Compatible Identity-Based Encryption [PDF]

open access: yesSensors, 2023
In this paper, we present a new identity-based encryption (IBE) system that is named Backward Compatible Identity-based Encryption (BC-IBE). Our BC-IBE is proposed to solve the problem caused by the out-of-synchronization between users’ private keys and ...
Jongkil Kim
doaj   +4 more sources

An efficient and provable secure revocable identity-based encryption scheme. [PDF]

open access: yesPLoS ONE, 2014
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either ...
Changji Wang   +3 more
doaj   +2 more sources

Medical Image Encryption Using Modified Identity Based Encryption

open access: yesEmitter: International Journal of Engineering Technology, 2019
The development of technology and communication also affects the level of security needed for digital image transmission. It is known that digital images now have important meanings in both communication and video conference.
Dian Neipa Purnamasari   +2 more
doaj   +3 more sources

An efficient lattice-based integrated revocable identity-based encryption [PDF]

open access: yesScientific Reports
Revocable identity-based encryption (RIBE) enables data encryption without certificates and allows for the revocation of users, thereby offering a more streamlined and secure approach to dynamic member management.
Haodong Huang   +3 more
doaj   +2 more sources

Efficient Extended Chaotic Map-Based IBE for Industrial Environment

open access: yesIEEE Access, 2022
Identity-based encryption is a public key-based method of encryption that enables communicating identities to use some individual and unique information, such as their physical IP addresses and MAC addresses, to identify them and as public keys.
Tian-Fu Lee, Yi-Chien Huang
doaj   +1 more source

Wildcarded Identity-Based Encryption [PDF]

open access: yesJournal of Cryptology, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Abdalla Michel   +7 more
openaire   +2 more sources

Towards an Auditable Cryptographic Access Control to High-value Sensitive Data [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
We discuss the challenge of achieving an auditable key management for cryptographic access control to high-value sensitive data. In such settings it is important to be able to audit the key management process - and in particular to be able to provide ...
Krzysztof Kanciak, Konrad Wrona
doaj   +1 more source

How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability

open access: yesIEEE Access, 2020
Attribute-based encryption (ABE) is a useful tool for sharing an encrypted data to a target group. In a ciphertext-policy ABE (CP-ABE) scheme, a ciphertext includes a policy to indicate its receivers and only those receivers can correctly decrypt the ...
Po-Wen Chi, Ming-Hung Wang, Hung-Jr Shiu
doaj   +1 more source

Identity-based Searchable Encryption Scheme Supporting Proxy Re-encryption [PDF]

open access: yesJisuanji gongcheng, 2019
The existing Identity-based Encryption with Keyword Search (IBEKS) cannot share search permissions.Therefore,an Identity-based Proxy Re-encryption with Keyword Search (IBPKS) scheme in cloud environment is proposed.The identity-based encryption algorithm
ZHU Minhui,CHEN Yanli,HU Yuanyuan
doaj   +1 more source

CCA-Secure Deterministic Identity-Based Encryption Scheme [PDF]

open access: yesJournal of Universal Computer Science, 2019
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized ...
Meijuan Huang   +5 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy