Results 201 to 210 of about 6,719 (236)

Secure facial biometric authentication in smart cities using multimodal methodology. [PDF]

open access: yesSci Rep
Sureshkumar A   +4 more
europepmc   +1 more source

Anonymous Multireceiver Identity-Based Encryption

IEEE Transactions on Computers, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fan, Chun-I   +2 more
openaire   +1 more source

Identity-Based Encryption

2020
In real applications, public-key encryption typically requires a mechanism such as public key infrastructure (PKI) to authenticate public keys, e.g., to generate a certificate that some entity or person owns the public key. However, the use of PKI and certificates might be very heavy and cumbersome in some applications.
Jiang Zhang, Zhenfeng Zhang
openaire   +1 more source

Identity-Based Encryption and Hierarchical Identity-Based Encryption

2009
We take a bird's eye view of different identity-based encryption (IBE) and hierarchical identity-based encryption (HIBE) protocols that are available in the literature and use bilinear pairing as the principal building block. We start with the seminal work on IBE by Boneh-Franklin.
Chatterjee Sanjit, Sarkar Palash
openaire   +1 more source

Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption

2012
In threshold identity-based encryption, a sender encrypts a message under identities of a pool of users and assigns a threshold t to the ciphertext, and sends the resulting ciphertext to these users. The cooperation of at least t users among them is required to decrypt the given ciphertext.
Kitak Kim   +4 more
openaire   +1 more source

Identity-Based Encryption Gone Wild

2006
In this paper we introduce the notion of identity based encryption with wildcards, or WIBE for short. This allows the encryption of messages to multiple parties with common fields in their identity strings, for example email groups in a corporate hierarchy.
ABDALLA MICHEL   +5 more
openaire   +2 more sources

Flexible identity based attribute encryption from identity based broadcast encryption

2008 International Symposium on Information Theory and Its Applications, 2008
In this paper we propose identity based attribute encryption from the identity based broadcast encryption which was proposed in IACR eprint No.217 2007. The encryption scheme can be applied to some access control systems. In such a system, the encrypted data can be written on the public boards.
openaire   +1 more source

IRIBE: Intrusion-resilient identity-based encryption

Information Sciences, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yu, Jia   +4 more
openaire   +1 more source

Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption

2012 Fourth International Symposium on Information Science and Engineering, 2012
In this paper, we propose a generic construction of forward-secure identity-based encryption. We first introduce a relaxed variant of hierarchical identity-based encryption called identity-based binary tree encryption and construct a concrete identity-based binary tree encryption scheme which is provably secure in the standard model.
Yang Lu, Jiguo Li
openaire   +1 more source

Home - About - Disclaimer - Privacy