Results 211 to 220 of about 6,719 (236)
Some of the next articles are maybe not open access.

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption

Information Sciences, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shao, Jun, Cao, Zhenfu
openaire   +2 more sources

Stateful identity-based encryption scheme

Proceedings of the 2008 ACM symposium on Information, computer and communications security, 2008
In this paper, we first present the notion of stateful identity-based encryption (IBE) and then extend standard security definitions for IBE to the stateful setting. After that, we demonstrate a concrete stateful IBE scheme, whose security meets the strongest definition in the setting in random oracle model, and whose encryption and decryption are very
Le Trieu Phong   +2 more
openaire   +1 more source

Efficient biometric identity-based encryption

Information Sciences, 2018
Abstract As a special case of public key encryption, identity-based encryption (IBE) takes any public known information as public key for encryption and then decrypts a ciphertext by a well-generated private key from private key generator (PKG). Unlike the traditional IBE using a text-based identity (e-mail, etc.) as public key, in this paper, we aim
Xiaoguo Li   +3 more
openaire   +1 more source

Identity-Based Group Encryption

2016
Cloud computing makes it easy for people to share files anywhere and anytime with mobile end devices. There is a privacy issue in such applications even if the files are encrypted. Specially, the public keys or identities of the receivers will be exposed to the cloud server or hackers.
Xiling Luo   +7 more
openaire   +1 more source

Identity-Based Format-Preserving Encryption

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
We introduce identity-based format-preserving encryption (IB-FPE) as a way to localize and limit the damage to format-preserving encryption (FPE) from key exposure. We give definitions, relations between them, generic attacks and two transforms of FPE schemes to IB-FPE schemes.
Mihir Bellare, Viet Tung Hoang
openaire   +1 more source

Universally Composable Identity-Based Encryption

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2006
Identity-based encryption (IBE) is one of the most important primitives in cryptography, and various security notions of IBE (e.g., IND-ID-CCA2, NM-ID-CCA2, IND-sID-CPA etc.) have been introduced. The relations among them have been clarified recently.
R. NISHIMAKI, Y. MANABE, T. OKAMOTO
openaire   +1 more source

HIBE: Hierarchical Identity-Based Encryption

2021
Cryptosystems fundamentally deal with the issue of securing data communication. Public key infrastructure (PKI) model requires an authenticated public key for encryption that has to be obtained prior to initiating communication. The identity-based encryption (IBE) essentially removes the public key distribution by using an arbitrary string, e.g., an ...
Tawseef Ahmed Teli   +2 more
openaire   +1 more source

Biometric Identity Based Encryption

2011
In this chapter, we evaluate the security properties and different applications of Identity Based Encryption (IBE) systems. Particularly, we consider biometric identities for IBE, which is a new encryption system defined as fuzzy IBE. Next, we analyze the security aspects of fuzzy IBE in terms of the security notions it must achieve and the prevention ...
openaire   +1 more source

Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption

2018
In a revocable identity-based encryption (RIBE) system, the private key and update key are generated separately and combined together to obtain the decryption key. Since the update key is distributed in a public channel, for each user, the private key and the decryption key are essential to his information security. Careless key management, e.g.
Rui Zhang, Yang Tao
openaire   +1 more source

Identity-Based Group Encryption Revisited

2018
In this paper, we focus on identity-based group encryption. We have revisited “Identity-Based Group Encryption (IBGE)” proposed by Xiling et al. Their scheme claims to achieve anonymity of the receiver. We have shown that the zero-knowledge proof they have used leaks much more information, due to which the verifier who is honest but curious will be ...
Kanika Gupta   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy