Results 21 to 30 of about 6,719 (236)
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the ...
Kwangsu Lee
doaj +1 more source
Tightly Secure Hierarchical Identity-Based Encryption [PDF]
AbstractWe construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length.The
Langrehr, R., Pan, J.
openaire +5 more sources
Identity-Based Matrix (Level) Fully Homomorphic Encryption Scheme
With the development of quantum theory, traditional encryption algorithms are facing enormous challenges. Once quantum computers are available, existing encryption systems will no longer be secure.
CHEN Hong, HUANG Jie, CHEN Honglin, WANG Runting, XIAO Chenglong, GUO Pengfei, JIN Haibo
doaj +1 more source
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes
The first identity-based fully homomorphic encryption (IBFHE) scheme was constructed from identity-based encryption (IBE) and lattice-based cryptography by Gentry, Sahai, and Waters in CRYPTO 2013. Their IBFHE scheme is improved in this paper, exploiting
Tongchen Shen +4 more
doaj +1 more source
Idealizing Identity-Based Encryption [PDF]
We formalize the standard application of identity-based encryption IBE, namely non-interactive secure communication, as realizing an ideal system which we call delivery controlled channel DCC. This system allows users to be registered by a central authority for an identity and to send messages securely to other users only known by their identity ...
Hofheinz, Dennis +2 more
openaire +2 more sources
Efficient Identity-based Encryption Scheme over Ideal Lattice [PDF]
Recently,Identity-based Encryption(IBE) scheme based on lattices becomes one of the focuses of cryptographic research.But the IBE scheme based on standard lattice have large key size and high ciphertext expansion rate.So based on ideal lattices,this ...
WEI Lihao,AI Jieqing,LIU Shenghan
doaj +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
DongâWoo Shin +2 more
wiley +1 more source
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in ...
Yanhua LU, Youliang TIAN, Chen LIU
doaj +2 more sources
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public keys. However, how to dynamically revoke users in an IBE scheme is not a trivial problem.
Ziyuan Hu +3 more
doaj +1 more source
Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization
In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems.
Na Li
doaj +1 more source

