Results 11 to 20 of about 6,719 (236)
Identity authentication scheme based on identity-based encryption
In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node ...
Ren-ji HUANG +2 more
doaj +3 more sources
In order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple ...
Wei HAO,Xu-an WANG,Xiao-yuan YANG,Li-qiang WU
doaj +3 more sources
Keyword Search Encryption Scheme for Designated Server in Email System [PDF]
The existing identity-based keyword search encryption schemes for designated server cannot satisfy the indistinguishability of keyword ciphertext.To meet the higher security requirements of email systems,this paper proposes an identity authentication ...
NIU Shufen, YANG Pingping, XIE Yaya, WANG Caifen, DU Xiaoni
doaj +1 more source
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption [PDF]
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides.
Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin
doaj +3 more sources
Anonymous Homomorphic IBE with Application to Anonymous Aggregation
All anonymous identity-based encryption (IBE) schemes that are group homomorphic (to the best of our knowledge) require knowledge of the identity to compute the homomorphic operation.
Michael Clear, Hitesh Tewari
doaj +1 more source
Attribute‐based encryption implies identity‐based encryption [PDF]
In this study, the author formally proves that designing attribute‐based encryption schemes cannot be easier than designing identity‐based encryption schemes. In more detail, they show how an attribute‐based encryption scheme which admits, at least, and policies can be combined with a ...
openaire +3 more sources
As a potential technology, the identity-based online/offline encryption scheme is split into two phases (the offline phase and the online phase) which is especially suitable for sensor nodes with limited computation resources in that most of the works ...
Xiujie Zhang +4 more
doaj +1 more source
Provably Secure Identity-based Conditional Proxy Re-encryption Scheme [PDF]
The conditional proxy re-encryption based on the traditional public key cryptosystem is mature,but the Identity-based Proxy Re-encryption(IBPRE) scheme,controlling agents’ permissions from the fine-grained level is a problem needed to be solved.Thus,this
YE Weiwei,OU Qingyu,WEI Wei
doaj +1 more source
Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic.
Er-Shuo Zhuang, Chun-I Fan
doaj +1 more source
Dynamic Searchable Encryption Scheme Based on Identity [PDF]
Searchable encryption technology saves user’s local storage resources and simplifies user’s search operation.However,most searchable encryption schemes are only static search.Therefore,this paper presents a dynamic searchable encryption scheme based on ...
NI Lulin,XU Chungen
doaj +1 more source

