Search

Search Results

Showing 1-20 of 16,808 results
  1. Article

    Fault-tolerant identity-based encryption from SM9

    This paper initiates the formal study of attribute-based encryption within the framework of SM9, the Chinese National Cryptography Standard for...

    Xiaohong Liu, Xinyi Huang, ... Wei Wu in Science China Information Sciences
    22 January 2024
  2. Conference paper

    Oblivious Identity-Based Encryption

    Identity-Based Encryption (IBE) was introduced in order to reduce the cost associated with Public Key Infrastructure systems. IBE allows users to...
    Aikaterini Mitrokotsa, Sayantan Mukherjee, Jenit Tomy in Selected Areas in Cryptography – SAC 2024
    2025
  3. Article
    Full access

    Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data

    With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive...

    Danial Shiraly, Ziba Eslami, Nasrollah Pakniat in Journal of Cloud Computing
    26 May 2024 Open access
  4. Conference paper

    Identity-Based Proxy Re-encryption Based on SM9

    Proxy re-encryption, as a cryptographic primitive, allows an untrusted proxy to transform a ciphertext encrypted with the data owner’s public key to...
    Hang Liu, Yang Ming, ... Yi Zhao in Information Security and Cryptology
    2024
  5. Conference paper

    Compact Post-quantum Bounded-Collusion Identity-Based Encryption

    Bounded-collusion identity-based encryption (BC-IBE) is a variant of identity-based encryption, where an adversary obtains at most d secret user-keys...
    Shingo Sato, Junji Shikata in Cryptology and Network Security
    2025
  6. Article
    Full access

    Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting

    We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many...

    Dennis Hofheinz, Jessica Koch, Christoph Striecks in Journal of Cryptology
    29 February 2024 Open access
  7. Article
    Full access

    Anonymous attribute-based broadcast encryption with hidden multiple access structures

    Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the...

    Tran Viet Xuan Phuong in Designs, Codes and Cryptography
    06 April 2024 Open access
  8. Conference paper

    Identity-Based Key Verifiable Inner Product Functional Encryption Scheme

    Functional encryption is a novel form of public key encryption that has captured significant attention since its inception, with researchers...
    Mingwu Zhang, Chao He, Gang Shen in Blockchain Technology and Emerging Applications
    2024
  9. Conference paper

    Anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption

    Identity-based encryption can simplify the certificate management problem of traditional public key cryptosystem. But it also has an inherent...
    2025
  10. Article

    Receiver selective opening security for identity-based encryption in the multi-challenge setting

    Receiver selective opening (RSO) security requires that in a situation where there are one sender and multiple receivers, even if an adversary has...

    Zhengan Huang, Junzuo Lai, ... Xin Mu in Designs, Codes and Cryptography
    17 November 2022
  11. Article
    Full access

    Key-Policy Attribute-Based Encryption Based on SM9

    Attribute-based encryption (ABE) is a type of encryption derived from identity-based encryption, implementing access control over encrypted data...

    Xiao-Hong Liu, Xin-Yi Huang, ... Jian-Ting Ning in Journal of Computer Science and Technology
    01 January 2025
  12. Article
    Full access

    Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity

    In recent years, the rapid proliferation of digital services and resources on Industrial Internet has imposed higher demands on universality and...

    Junli Fang, Tao Feng, ... Xusheng Wang in Journal of Cloud Computing
    08 November 2024 Open access
  13. Article
    Full access

    Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system

    Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and...

    Ke Yuan, Ziwei Cheng, ... Chunfu Jia in Journal of Cloud Computing
    12 June 2024 Open access
  14. Conference paper

    Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWE

    In this paper, we propose an efficient identity-based encryption (IBE) scheme based on the ring learning with errors (RLWE) assumption in the...
    Toi Tomita, Junji Shikata in Post-Quantum Cryptography
    2024
  15. Article

    Identity-based threshold proxy re-encryption scheme from lattices and its applications

    Threshold proxy re-encryption (TPRE) can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes...

    Liqiang Wu, Yiliang Han, ... Minqing Zhang in Frontiers of Information Technology & Electronic Engineering
    01 February 2022
  16. Article

    Leakage-resilient identity-based cryptography from minimal assumptions

    Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...

    Yanwei Zhou, Bo Yang, ... Yi Mu in Designs, Codes and Cryptography
    16 August 2023
  17. Article

    Privacy preserving spatio-temporal attribute-based encryption for cloud applications

    Cloud computing offers scalable implementation of applications by sharing internet-based storage and computing resources. However, its ubiquitous...

    Kasturi Routray, Padmalochan Bera in Cluster Computing
    23 October 2024
  18. Article

    Mixed-multiple image encryption algorithm using RSA cryptosystem with fractional discrete cosine transform and 2D-Arnold Transform

    This paper presents a novel multiple-image encryption (MIE) technique based on mixed image elements associated with RSA cryptosystem, fractional...

    Yashavant Kumar, Vandana Guleria in Multimedia Tools and Applications
    03 October 2023
  19. Conference paper

    Optimizing Cloud Identity Based Encryption to Secure Data: A Sustainable Approach

    Cloud computing (CC) is a distributed architecture to enable accessing of several security measures. To ensure data privacy, a technique called...
    Mohd. Zeeshan Ali, Suhail Javed Quraishi in Sustainable Development through Machine Learning, AI and IoT
    2025
Did you find what you were looking for? Share feedback.