Results 31 to 40 of about 80,521 (269)

Low-energy finite field arithmetic primitives for implementing security in wireless sensor networks [PDF]

open access: yes, 2006
In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless sensor network. In this context we have implemented the arithmetic operations required for the most computationally expensive part of IBE, which is the ...
Diamond, Dermot   +2 more
core   +1 more source

Cost-effective secure e-health cloud system using identity based cryptographic techniques [PDF]

open access: yes, 2016
Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients.
Luo, Xiaoshuang   +4 more
core   +2 more sources

Provably Secure Identity-based Conditional Proxy Re-encryption Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
The conditional proxy re-encryption based on the traditional public key cryptosystem is mature,but the Identity-based Proxy Re-encryption(IBPRE) scheme,controlling agents’ permissions from the fine-grained level is a problem needed to be solved.Thus,this
YE Weiwei,OU Qingyu,WEI Wei
doaj   +1 more source

Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices

open access: yesMathematics, 2023
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic.
Er-Shuo Zhuang, Chun-I Fan
doaj   +1 more source

Dynamic Searchable Encryption Scheme Based on Identity [PDF]

open access: yesJisuanji gongcheng, 2019
Searchable encryption technology saves user’s local storage resources and simplifies user’s search operation.However,most searchable encryption schemes are only static search.Therefore,this paper presents a dynamic searchable encryption scheme based on ...
NI Lulin,XU Chungen
doaj   +1 more source

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

Tightly Secure Hierarchical Identity-Based Encryption [PDF]

open access: yesJournal of Cryptology, 2019
AbstractWe construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length.The
Langrehr, R., Pan, J.
openaire   +5 more sources

Identity-Based Matrix (Level) Fully Homomorphic Encryption Scheme

open access: yesJisuanji kexue yu tansuo, 2020
With the development of quantum theory, traditional encryption algorithms are facing enormous challenges. Once quantum computers are available, existing encryption systems will no longer be secure.
CHEN Hong, HUANG Jie, CHEN Honglin, WANG Runting, XIAO Chenglong, GUO Pengfei, JIN Haibo
doaj   +1 more source

Delegate and Verify the Update Keys of Revocable Identity-Based Encryption

open access: yesIEEE Access, 2023
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the ...
Kwangsu Lee
doaj   +1 more source

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

Home - About - Disclaimer - Privacy