Results 21 to 30 of about 80,521 (269)

Identity-based Searchable Encryption Scheme Supporting Proxy Re-encryption [PDF]

open access: yesJisuanji gongcheng, 2019
The existing Identity-based Encryption with Keyword Search (IBEKS) cannot share search permissions.Therefore,an Identity-based Proxy Re-encryption with Keyword Search (IBPKS) scheme in cloud environment is proposed.The identity-based encryption algorithm
ZHU Minhui,CHEN Yanli,HU Yuanyuan
doaj   +1 more source

CCA-Secure Deterministic Identity-Based Encryption Scheme [PDF]

open access: yesJournal of Universal Computer Science, 2019
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized ...
Meijuan Huang   +5 more
doaj   +3 more sources

Identity authentication scheme based on identity-based encryption

open access: yes网络与信息安全学报, 2016
In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node ...
Ren-ji HUANG   +2 more
doaj   +3 more sources

On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]

open access: yes, 2008
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core   +12 more sources

Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal

open access: yes网络与信息安全学报, 2016
In order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple ...
Wei HAO,Xu-an WANG,Xiao-yuan YANG,Li-qiang WU
doaj   +3 more sources

Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption [PDF]

open access: yesJournal of Universal Computer Science, 2019
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides.
Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin
doaj   +3 more sources

Anonymous Homomorphic IBE with Application to Anonymous Aggregation

open access: yesCryptography, 2023
All anonymous identity-based encryption (IBE) schemes that are group homomorphic (to the best of our knowledge) require knowledge of the identity to compute the homomorphic operation.
Michael Clear, Hitesh Tewari
doaj   +1 more source

Keyword Search Encryption Scheme for Designated Server in Email System [PDF]

open access: yesJisuanji gongcheng, 2020
The existing identity-based keyword search encryption schemes for designated server cannot satisfy the indistinguishability of keyword ciphertext.To meet the higher security requirements of email systems,this paper proposes an identity authentication ...
NIU Shufen, YANG Pingping, XIE Yaya, WANG Caifen, DU Xiaoni
doaj   +1 more source

Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network

open access: yesInternational Journal of Distributed Sensor Networks, 2020
As a potential technology, the identity-based online/offline encryption scheme is split into two phases (the offline phase and the online phase) which is especially suitable for sensor nodes with limited computation resources in that most of the works ...
Xiujie Zhang   +4 more
doaj   +1 more source

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy