Results 11 to 20 of about 80,521 (269)
Backward Compatible Identity-Based Encryption [PDF]
In this paper, we present a new identity-based encryption (IBE) system that is named Backward Compatible Identity-based Encryption (BC-IBE). Our BC-IBE is proposed to solve the problem caused by the out-of-synchronization between users’ private keys and ...
Jongkil Kim
doaj +4 more sources
Attribute-based encryption implies identity-based encryption [PDF]
In this study, the author formally proves that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes.
Herranz Sotoca, Javier
core +6 more sources
Secure Communication using Identity Based Encryption [PDF]
Secured communication has been widely deployed to guarantee confidentiality and\ud integrity of connections over untrusted networks, e.g., the Internet.
Cheng, Feng +3 more
core +7 more sources
An efficient and provable secure revocable identity-based encryption scheme. [PDF]
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either ...
Changji Wang +3 more
doaj +2 more sources
Medical Image Encryption Using Modified Identity Based Encryption
The development of technology and communication also affects the level of security needed for digital image transmission. It is known that digital images now have important meanings in both communication and video conference.
Dian Neipa Purnamasari +2 more
doaj +3 more sources
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes
The first identity-based fully homomorphic encryption (IBFHE) scheme was constructed from identity-based encryption (IBE) and lattice-based cryptography by Gentry, Sahai, and Waters in CRYPTO 2013. Their IBFHE scheme is improved in this paper, exploiting
Tongchen Shen +4 more
doaj +3 more sources
Efficient Extended Chaotic Map-Based IBE for Industrial Environment
Identity-based encryption is a public key-based method of encryption that enables communicating identities to use some individual and unique information, such as their physical IP addresses and MAC addresses, to identify them and as public keys.
Tian-Fu Lee, Yi-Chien Huang
doaj +1 more source
Wildcarded Identity-Based Encryption [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Abdalla Michel +7 more
openaire +2 more sources
Towards an Auditable Cryptographic Access Control to High-value Sensitive Data [PDF]
We discuss the challenge of achieving an auditable key management for cryptographic access control to high-value sensitive data. In such settings it is important to be able to audit the key management process - and in particular to be able to provide ...
Krzysztof Kanciak, Konrad Wrona
doaj +1 more source
How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability
Attribute-based encryption (ABE) is a useful tool for sharing an encrypted data to a target group. In a ciphertext-policy ABE (CP-ABE) scheme, a ciphertext includes a policy to indicate its receivers and only those receivers can correctly decrypt the ...
Po-Wen Chi, Ming-Hung Wang, Hung-Jr Shiu
doaj +1 more source

