Results 21 to 30 of about 80,521 (269)
Identity-based Searchable Encryption Scheme Supporting Proxy Re-encryption [PDF]
The existing Identity-based Encryption with Keyword Search (IBEKS) cannot share search permissions.Therefore,an Identity-based Proxy Re-encryption with Keyword Search (IBPKS) scheme in cloud environment is proposed.The identity-based encryption algorithm
ZHU Minhui,CHEN Yanli,HU Yuanyuan
doaj +1 more source
CCA-Secure Deterministic Identity-Based Encryption Scheme [PDF]
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized ...
Meijuan Huang +5 more
doaj +3 more sources
Identity authentication scheme based on identity-based encryption
In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node ...
Ren-ji HUANG +2 more
doaj +3 more sources
On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core +12 more sources
In order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple ...
Wei HAO,Xu-an WANG,Xiao-yuan YANG,Li-qiang WU
doaj +3 more sources
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption [PDF]
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides.
Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin
doaj +3 more sources
Anonymous Homomorphic IBE with Application to Anonymous Aggregation
All anonymous identity-based encryption (IBE) schemes that are group homomorphic (to the best of our knowledge) require knowledge of the identity to compute the homomorphic operation.
Michael Clear, Hitesh Tewari
doaj +1 more source
Keyword Search Encryption Scheme for Designated Server in Email System [PDF]
The existing identity-based keyword search encryption schemes for designated server cannot satisfy the indistinguishability of keyword ciphertext.To meet the higher security requirements of email systems,this paper proposes an identity authentication ...
NIU Shufen, YANG Pingping, XIE Yaya, WANG Caifen, DU Xiaoni
doaj +1 more source
As a potential technology, the identity-based online/offline encryption scheme is split into two phases (the offline phase and the online phase) which is especially suitable for sensor nodes with limited computation resources in that most of the works ...
Xiujie Zhang +4 more
doaj +1 more source
Forward-secure hierarchical predicate encryption [PDF]
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan +2 more
core +2 more sources

