Results 221 to 230 of about 80,521 (269)
Some of the next articles are maybe not open access.

IRIBE: Intrusion-resilient identity-based encryption

Information Sciences, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yu, Jia   +4 more
openaire   +3 more sources

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption

Information Sciences, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shao, Jun, Cao, Zhenfu
openaire   +4 more sources

Identity-Based Encryption

2020
In real applications, public-key encryption typically requires a mechanism such as public key infrastructure (PKI) to authenticate public keys, e.g., to generate a certificate that some entity or person owns the public key. However, the use of PKI and certificates might be very heavy and cumbersome in some applications.
Jiang Zhang, Zhenfeng Zhang
openaire   +1 more source

Identity-Based Encryption and Hierarchical Identity-Based Encryption

2009
We take a bird's eye view of different identity-based encryption (IBE) and hierarchical identity-based encryption (HIBE) protocols that are available in the literature and use bilinear pairing as the principal building block. We start with the seminal work on IBE by Boneh-Franklin.
Chatterjee Sanjit, Sarkar Palash
openaire   +1 more source

Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption

2012
In threshold identity-based encryption, a sender encrypts a message under identities of a pool of users and assigns a threshold t to the ciphertext, and sends the resulting ciphertext to these users. The cooperation of at least t users among them is required to decrypt the given ciphertext.
Kitak Kim   +4 more
openaire   +1 more source

Identity-Based Encryption Gone Wild

2006
In this paper we introduce the notion of identity based encryption with wildcards, or WIBE for short. This allows the encryption of messages to multiple parties with common fields in their identity strings, for example email groups in a corporate hierarchy.
ABDALLA MICHEL   +5 more
openaire   +2 more sources

Flexible identity based attribute encryption from identity based broadcast encryption

2008 International Symposium on Information Theory and Its Applications, 2008
In this paper we propose identity based attribute encryption from the identity based broadcast encryption which was proposed in IACR eprint No.217 2007. The encryption scheme can be applied to some access control systems. In such a system, the encrypted data can be written on the public boards.
openaire   +1 more source

Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption

2012 Fourth International Symposium on Information Science and Engineering, 2012
In this paper, we propose a generic construction of forward-secure identity-based encryption. We first introduce a relaxed variant of hierarchical identity-based encryption called identity-based binary tree encryption and construct a concrete identity-based binary tree encryption scheme which is provably secure in the standard model.
Yang Lu, Jiguo Li
openaire   +1 more source

Stateful identity-based encryption scheme

Proceedings of the 2008 ACM symposium on Information, computer and communications security, 2008
In this paper, we first present the notion of stateful identity-based encryption (IBE) and then extend standard security definitions for IBE to the stateful setting. After that, we demonstrate a concrete stateful IBE scheme, whose security meets the strongest definition in the setting in random oracle model, and whose encryption and decryption are very
Le Trieu Phong   +2 more
openaire   +1 more source

Efficient biometric identity-based encryption

Information Sciences, 2018
Abstract As a special case of public key encryption, identity-based encryption (IBE) takes any public known information as public key for encryption and then decrypts a ciphertext by a well-generated private key from private key generator (PKG). Unlike the traditional IBE using a text-based identity (e-mail, etc.) as public key, in this paper, we aim
Xiaoguo Li   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy