Results 241 to 250 of about 80,521 (269)
Some of the next articles are maybe not open access.

Identity Based Encryption Without Redundancy

2005
This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Franklin IBE is an hybrid construction that is proved to be secure (using proof techniques borrowed from those for KEM-DEM constructions) in the random oracle model under a slightly
BenoƮt Libert, Jean-Jacques Quisquater
openaire   +1 more source

Multimodal biometric Identity Based Encryption

Future Generation Computer Systems, 2018
Abstract In this paper, we describe the first generic construction for multimodal biometric Identity Based Encryption considering two distance measures at the same time. Current protocols for fuzzy/biometric IBE are designed either for set overlap or Euclidean distance within unimodal biometrics.
openaire   +1 more source

Identity-Based Encryption (2)

2021
Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire   +1 more source

Hierarchical Identity-Based Encryption

2021
Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire   +1 more source

Identity-Based Encryption (3)

2021
Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire   +1 more source

Identity-Based Encryption (4)

2021
Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire   +1 more source

Identity-Based Encryption (1)

2021
Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire   +1 more source

P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption

IEEE Transactions on Vehicular Technology, 2020
SUMANA MAITI, Sudip Misra
exaly  

Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud

IEEE Transactions on Information Forensics and Security, 2020
Hua Deng, Zheng Qin, Qianhong Wu
exaly  

Home - About - Disclaimer - Privacy