Low-energy finite field arithmetic primitives for implementing security in wireless sensor networks [PDF]
In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless sensor network. In this context we have implemented the arithmetic operations required for the most computationally expensive part of IBE, which is the ...
Diamond, Dermot +2 more
core +1 more source
Cost-effective secure e-health cloud system using identity based cryptographic techniques [PDF]
Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients.
Luo, Xiaoshuang +4 more
core +2 more sources
Provably Secure Identity-based Conditional Proxy Re-encryption Scheme [PDF]
The conditional proxy re-encryption based on the traditional public key cryptosystem is mature,but the Identity-based Proxy Re-encryption(IBPRE) scheme,controlling agents’ permissions from the fine-grained level is a problem needed to be solved.Thus,this
YE Weiwei,OU Qingyu,WEI Wei
doaj +1 more source
Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic.
Er-Shuo Zhuang, Chun-I Fan
doaj +1 more source
Dynamic Searchable Encryption Scheme Based on Identity [PDF]
Searchable encryption technology saves user’s local storage resources and simplifies user’s search operation.However,most searchable encryption schemes are only static search.Therefore,this paper presents a dynamic searchable encryption scheme based on ...
NI Lulin,XU Chungen
doaj +1 more source
An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul +3 more
core +2 more sources
Tightly Secure Hierarchical Identity-Based Encryption [PDF]
AbstractWe construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length.The
Langrehr, R., Pan, J.
openaire +5 more sources
Identity-Based Matrix (Level) Fully Homomorphic Encryption Scheme
With the development of quantum theory, traditional encryption algorithms are facing enormous challenges. Once quantum computers are available, existing encryption systems will no longer be secure.
CHEN Hong, HUANG Jie, CHEN Honglin, WANG Runting, XIAO Chenglong, GUO Pengfei, JIN Haibo
doaj +1 more source
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the ...
Kwangsu Lee
doaj +1 more source
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source

