Results 1 to 10 of about 80,521 (269)

Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption

open access: yesIEEE Access, 2019
Accountable authority identity-based encryption (A-IBE), as an attractive way to guarantee the user privacy security, enables a malicious private key generator (PKG) to be traced if it generates and re-distributes a user private key.
Zhen Zhao   +5 more
doaj   +1 more source

ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

open access: yes, 2013
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan   +3 more
core  

Identity-Based Online/Offline Encryption Scheme from LWE

open access: yesInformation
With quantum computers, the quantum resistance of cryptographic systems has gradually attracted attention. To overcome the shortcoming of existing identity-based encryption (IBE) schemes in resisting quantum attacks, we introduce an IBE scheme based on ...
Binger Zuo   +3 more
doaj   +1 more source

Revocable hierarchical identity-based encryption

open access: yesTheoretical Computer Science, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Seo, Jae Hong, Emura, Keita
openaire   +1 more source

OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data

open access: yesMathematics
As smart education evolves, there is an increasing need for the cloud-centric management and sharing of student exercise physiological data gathered through wearable devices in the physical education domain.
You Zhao, Ye Song, Weiyi Song, Juyan Li
doaj   +1 more source

Identity-Based Encryption [PDF]

open access: yes, 2011
Sanjit Chatterjee, Palash Sarkar
openaire   +2 more sources

Name-Based Security for Information-Centric Networking Architectures

open access: yesFuture Internet, 2019
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice.
Nikos Fotiou, George C. Polyzos
doaj   +1 more source

Identity-Based Matchmaking Encryption with Equality Test

open access: yesEntropy
The identity-based encryption with equality test (IBEET) has become a hot research topic in cloud computing as it provides an equality test for ciphertexts generated under different identities while preserving the confidentiality.
Zhen Yan   +4 more
doaj   +1 more source

Proxy Re-encryption Systems for Identity-Based Encryption [PDF]

open access: yes, 2007
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional PKI-based public key into the ciphertexts
openaire   +1 more source

Home - About - Disclaimer - Privacy