Results 241 to 250 of about 80,521 (269)
Some of the next articles are maybe not open access.
Identity Based Encryption Without Redundancy
2005This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Franklin IBE is an hybrid construction that is proved to be secure (using proof techniques borrowed from those for KEM-DEM constructions) in the random oracle model under a slightly
BenoƮt Libert, Jean-Jacques Quisquater
openaire +1 more source
Multimodal biometric Identity Based Encryption
Future Generation Computer Systems, 2018Abstract In this paper, we describe the first generic construction for multimodal biometric Identity Based Encryption considering two distance measures at the same time. Current protocols for fuzzy/biometric IBE are designed either for set overlap or Euclidean distance within unimodal biometrics.
openaire +1 more source
Hierarchical Identity-Based Encryption and Attribute-Based Encryption
2021Qianhong Wu, Hua Deng
openaire +1 more source
Hierarchical Identity-Based Encryption
2021Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire +1 more source
P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption
IEEE Transactions on Vehicular Technology, 2020SUMANA MAITI, Sudip Misra
exaly
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
IEEE Transactions on Information Forensics and Security, 2020Hua Deng, Zheng Qin, Qianhong Wu
exaly

