Results 21 to 30 of about 6,719 (236)

Delegate and Verify the Update Keys of Revocable Identity-Based Encryption

open access: yesIEEE Access, 2023
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the ...
Kwangsu Lee
doaj   +1 more source

Tightly Secure Hierarchical Identity-Based Encryption [PDF]

open access: yesJournal of Cryptology, 2019
AbstractWe construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length.The
Langrehr, R., Pan, J.
openaire   +5 more sources

Identity-Based Matrix (Level) Fully Homomorphic Encryption Scheme

open access: yesJisuanji kexue yu tansuo, 2020
With the development of quantum theory, traditional encryption algorithms are facing enormous challenges. Once quantum computers are available, existing encryption systems will no longer be secure.
CHEN Hong, HUANG Jie, CHEN Honglin, WANG Runting, XIAO Chenglong, GUO Pengfei, JIN Haibo
doaj   +1 more source

Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes

open access: yesIEEE Access, 2019
The first identity-based fully homomorphic encryption (IBFHE) scheme was constructed from identity-based encryption (IBE) and lattice-based cryptography by Gentry, Sahai, and Waters in CRYPTO 2013. Their IBFHE scheme is improved in this paper, exploiting
Tongchen Shen   +4 more
doaj   +1 more source

Idealizing Identity-Based Encryption [PDF]

open access: yes, 2015
We formalize the standard application of identity-based encryption IBE, namely non-interactive secure communication, as realizing an ideal system which we call delivery controlled channel DCC. This system allows users to be registered by a central authority for an identity and to send messages securely to other users only known by their identity ...
Hofheinz, Dennis   +2 more
openaire   +2 more sources

Efficient Identity-based Encryption Scheme over Ideal Lattice [PDF]

open access: yesJisuanji gongcheng, 2016
Recently,Identity-based Encryption(IBE) scheme based on lattices becomes one of the focuses of cryptographic research.But the IBE scheme based on standard lattice have large key size and high ciphertext expansion rate.So based on ideal lattices,this ...
WEI Lihao,AI Jieqing,LIU Shenghan
doaj   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Multi-server conjunctive keyword searchable encryption scheme based on BDH problem

open access: yesDianxin kexue, 2020
Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in ...
Yanhua LU, Youliang TIAN, Chen LIU
doaj   +2 more sources

Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption

open access: yesCryptography, 2018
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public keys. However, how to dynamically revoke users in an IBE scheme is not a trivial problem.
Ziyuan Hu   +3 more
doaj   +1 more source

Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization

open access: yesEntropy, 2023
In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems.
Na Li
doaj   +1 more source

Home - About - Disclaimer - Privacy