Results 11 to 20 of about 6,719 (236)

Identity authentication scheme based on identity-based encryption

open access: yes网络与信息安全学报, 2016
In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node ...
Ren-ji HUANG   +2 more
doaj   +3 more sources

Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal

open access: yes网络与信息安全学报, 2016
In order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple ...
Wei HAO,Xu-an WANG,Xiao-yuan YANG,Li-qiang WU
doaj   +3 more sources

Keyword Search Encryption Scheme for Designated Server in Email System [PDF]

open access: yesJisuanji gongcheng, 2020
The existing identity-based keyword search encryption schemes for designated server cannot satisfy the indistinguishability of keyword ciphertext.To meet the higher security requirements of email systems,this paper proposes an identity authentication ...
NIU Shufen, YANG Pingping, XIE Yaya, WANG Caifen, DU Xiaoni
doaj   +1 more source

Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption [PDF]

open access: yesJournal of Universal Computer Science, 2019
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides.
Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin
doaj   +3 more sources

Anonymous Homomorphic IBE with Application to Anonymous Aggregation

open access: yesCryptography, 2023
All anonymous identity-based encryption (IBE) schemes that are group homomorphic (to the best of our knowledge) require knowledge of the identity to compute the homomorphic operation.
Michael Clear, Hitesh Tewari
doaj   +1 more source

Attribute‐based encryption implies identity‐based encryption [PDF]

open access: yesIET Information Security, 2017
In this study, the author formally proves that designing attribute‐based encryption schemes cannot be easier than designing identity‐based encryption schemes. In more detail, they show how an attribute‐based encryption scheme which admits, at least, and policies can be combined with a ...
openaire   +3 more sources

Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network

open access: yesInternational Journal of Distributed Sensor Networks, 2020
As a potential technology, the identity-based online/offline encryption scheme is split into two phases (the offline phase and the online phase) which is especially suitable for sensor nodes with limited computation resources in that most of the works ...
Xiujie Zhang   +4 more
doaj   +1 more source

Provably Secure Identity-based Conditional Proxy Re-encryption Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
The conditional proxy re-encryption based on the traditional public key cryptosystem is mature,but the Identity-based Proxy Re-encryption(IBPRE) scheme,controlling agents’ permissions from the fine-grained level is a problem needed to be solved.Thus,this
YE Weiwei,OU Qingyu,WEI Wei
doaj   +1 more source

Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices

open access: yesMathematics, 2023
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic.
Er-Shuo Zhuang, Chun-I Fan
doaj   +1 more source

Dynamic Searchable Encryption Scheme Based on Identity [PDF]

open access: yesJisuanji gongcheng, 2019
Searchable encryption technology saves user’s local storage resources and simplifies user’s search operation.However,most searchable encryption schemes are only static search.Therefore,this paper presents a dynamic searchable encryption scheme based on ...
NI Lulin,XU Chungen
doaj   +1 more source

Home - About - Disclaimer - Privacy