Results 1 to 10 of about 80,521 (269)
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption
Accountable authority identity-based encryption (A-IBE), as an attractive way to guarantee the user privacy security, enables a malicious private key generator (PKG) to be traced if it generates and re-distributes a user private key.
Zhen Zhao +5 more
doaj +1 more source
ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan +3 more
core
Identity-Based Online/Offline Encryption Scheme from LWE
With quantum computers, the quantum resistance of cryptographic systems has gradually attracted attention. To overcome the shortcoming of existing identity-based encryption (IBE) schemes in resisting quantum attacks, we introduce an IBE scheme based on ...
Binger Zuo +3 more
doaj +1 more source
Revocable hierarchical identity-based encryption
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Seo, Jae Hong, Emura, Keita
openaire +1 more source
As smart education evolves, there is an increasing need for the cloud-centric management and sharing of student exercise physiological data gathered through wearable devices in the physical education domain.
You Zhao, Ye Song, Weiyi Song, Juyan Li
doaj +1 more source
Name-Based Security for Information-Centric Networking Architectures
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice.
Nikos Fotiou, George C. Polyzos
doaj +1 more source
Identity-Based Matchmaking Encryption with Equality Test
The identity-based encryption with equality test (IBEET) has become a hot research topic in cloud computing as it provides an equality test for ciphertexts generated under different identities while preserving the confidentiality.
Zhen Yan +4 more
doaj +1 more source
A generic construction for revocable identity-based encryption with subset difference methods. [PDF]
Lee K.
europepmc +1 more source
Proxy Re-encryption Systems for Identity-Based Encryption [PDF]
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional PKI-based public key into the ciphertexts
openaire +1 more source

