Search
Search Results
-
Fault-tolerant identity-based encryption from SM9
This paper initiates the formal study of attribute-based encryption within the framework of SM9, the Chinese National Cryptography Standard for...
-
Oblivious Identity-Based Encryption
Identity-Based Encryption (IBE) was introduced in order to reduce the cost associated with Public Key Infrastructure systems. IBE allows users to... -
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive...
-
Identity-Based Proxy Re-encryption Based on SM9
Proxy re-encryption, as a cryptographic primitive, allows an untrusted proxy to transform a ciphertext encrypted with the data owner’s public key to... -
Compact Post-quantum Bounded-Collusion Identity-Based Encryption
Bounded-collusion identity-based encryption (BC-IBE) is a variant of identity-based encryption, where an adversary obtains at most d secret user-keys... -
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many...
-
Anonymous attribute-based broadcast encryption with hidden multiple access structures
Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the...
-
Identity-Based Key Verifiable Inner Product Functional Encryption Scheme
Functional encryption is a novel form of public key encryption that has captured significant attention since its inception, with researchers... -
Anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption
Identity-based encryption can simplify the certificate management problem of traditional public key cryptosystem. But it also has an inherent... -
Receiver selective opening security for identity-based encryption in the multi-challenge setting
Receiver selective opening (RSO) security requires that in a situation where there are one sender and multiple receivers, even if an adversary has...
-
Key-Policy Attribute-Based Encryption Based on SM9
Attribute-based encryption (ABE) is a type of encryption derived from identity-based encryption, implementing access control over encrypted data...
-
Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity
In recent years, the rapid proliferation of digital services and resources on Industrial Internet has imposed higher demands on universality and...
-
Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system
Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and...
-
-
Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWE
In this paper, we propose an efficient identity-based encryption (IBE) scheme based on the ring learning with errors (RLWE) assumption in the... -
Identity-based threshold proxy re-encryption scheme from lattices and its applications
Threshold proxy re-encryption (TPRE) can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes...
-
Leakage-resilient identity-based cryptography from minimal assumptions
Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...
-
Privacy preserving spatio-temporal attribute-based encryption for cloud applications
Cloud computing offers scalable implementation of applications by sharing internet-based storage and computing resources. However, its ubiquitous...
-
Mixed-multiple image encryption algorithm using RSA cryptosystem with fractional discrete cosine transform and 2D-Arnold Transform
This paper presents a novel multiple-image encryption (MIE) technique based on mixed image elements associated with RSA cryptosystem, fractional...
-
Optimizing Cloud Identity Based Encryption to Secure Data: A Sustainable Approach
Cloud computing (CC) is a distributed architecture to enable accessing of several security measures. To ensure data privacy, a technique called...