Search Results - "Identity Based Encryption"
-
1
Tightly secure (H)IBE in the random oracle model
ISSN: 0304-3975, 1879-2294Published: Elsevier B.V 29.07.2024Published in Theoretical computer science (29.07.2024)“…We present an adaptively secure identity-based encryption (IBE) scheme with constant sized parameters and constant security loss in multi-instance…”
Get full text
Journal Article -
2
Cloud‐aided scalable revocable identity‐based encryption scheme with ciphertext update
ISSN: 1532-0626, 1532-0634Published: Hoboken Wiley Subscription Services, Inc 25.10.2017Published in Concurrency and computation (25.10.2017)“…Summary Key revocation and ciphertext update are two critical issues for identity‐based encryption schemes. Designing an identity‐based encryption scheme with…”
Get full text
Journal Article -
3
Designated-server identity-based authenticated encryption with keyword search for encrypted emails
ISSN: 0020-0255, 1872-6291Published: Elsevier Inc 01.05.2019Published in Information sciences (01.05.2019)“…In encrypted email system, how to search over encrypted cloud emails without decryption is an important and practical problem. Public key encryption with…”
Get full text
Journal Article -
4
Provably Secure Authenticated Key Agreement Scheme for Smart Grid
ISSN: 1949-3053, 1949-3061Published: IEEE 01.05.2018Published in IEEE transactions on smart grid (01.05.2018)“…Due to the rapid development of wireless communication systems, authentication becomes a key security component in smart grid environments. Authentication then…”
Get full text
Journal Article -
5
A Semi-Centralized Dynamic Key Management Framework for In-Vehicle Networks
ISSN: 0018-9545, 1939-9359Published: New York IEEE 01.10.2021Published in IEEE transactions on vehicular technology (01.10.2021)“…The current in-vehicle network lacks a robust security communication mechanism between Electronic Control Units (ECUs). Although different proposed frameworks…”
Get full text
Journal Article -
6
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
ISSN: 0020-0255, 1872-6291Published: Elsevier Inc 01.08.2019Published in Information sciences (01.08.2019)“…•We propose an efficient proxy-oriented identity-based encryption with keyword search scheme (PO-IBEKS) from lattices.•PO-IBEKS enables an original data owner…”
Get full text
Journal Article -
7
Algorithm Substitution‐Resistant SM9‐Based Searchable Encryption With Cryptographic Reverse Firewall for Cloud Storage
ISSN: 1532-0626, 1532-0634Published: Hoboken, USA John Wiley & Sons, Inc 15.05.2025Published in Concurrency and computation (15.05.2025)“…To protect data privacy in cloud storage, sensitive data is commonly encrypted before being uploaded to a cloud storage server (CSS). This process challenges…”
Get full text
Journal Article -
8
An Efficient Multiuser Threshold–Based Dynamic Cipher Puzzle With Secure Key Generation for DoS Attacks in Smart Grid Applications
ISSN: 2161-3915, 2161-3915Published: Chichester, UK John Wiley & Sons, Ltd 01.07.2025Published in Transactions on emerging telecommunications technologies (01.07.2025)“…Denial‐of‐service (DoS) attacks in smart grid applications involve malicious attempts to disrupt or compromise the availability and functionality of the grid's…”
Get full text
Journal Article -
9
Public key encryption with equality test in the standard model
ISSN: 0020-0255, 1872-6291Published: Elsevier Inc 01.04.2020Published in Information sciences (01.04.2020)“…Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users Ui to perform equality…”
Get full text
Journal Article -
10
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
ISSN: 1574-0137, 1876-7745Published: Elsevier Inc 01.02.2023Published in Computer science review (01.02.2023)“…Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve Cryptography (ECC). EC is often used to improve the security of open…”
Get full text
Journal Article -
11
Efficient and secure identity-based encryption scheme with equality test in cloud computing
ISSN: 0167-739X, 1872-7115Published: Elsevier B.V 01.08.2017Published in Future generation computer systems (01.08.2017)“…Efficient searching on encrypted data outsourced to the cloud remains a research challenge. Identity-based encryption with equality test (IBEET) scheme has…”
Get full text
Journal Article -
12
A continuous leakage-amplified IBE scheme with perfect key update
ISSN: 0304-3975Published: Elsevier B.V 09.11.2025Published in Theoretical computer science (09.11.2025)“…In the practical deployment of cryptographic solutions, diverse applications pose unique challenges in terms of leakage resilience. The one-size-fits-all…”
Get full text
Journal Article -
13
Privacy-Preserving Identity-Based Data Rights Governance for Blockchain-Empowered Human-Centric Metaverse Communications
ISSN: 0733-8716, 1558-0008Published: New York IEEE 01.04.2024Published in IEEE journal on selected areas in communications (01.04.2024)“…Metaverse provides human-centric immersive communication experiences where humans can teleport across different virtual landscapes and build real-time…”
Get full text
Journal Article -
14
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
ISSN: 0018-9340, 1557-9956Published: New York IEEE 01.02.2015Published in IEEE transactions on computers (01.02.2015)“…Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to…”
Get full text
Journal Article -
15
P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption
ISSN: 0018-9545, 1939-9359Published: New York IEEE 01.05.2020Published in IEEE transactions on vehicular technology (01.05.2020)“…This paper proposes Privacy Preserving Identity-Based Broadcast Proxy Re-encryption (P2B) - a scheme to provide privacy preserving in identity-based broadcast…”
Get full text
Journal Article -
16
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.05.2019Published in IEEE transactions on dependable and secure computing (01.05.2019)“…Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of…”
Get full text
Journal Article -
17
Secure Anonymous Key Distribution Scheme for Smart Grid
ISSN: 1949-3053, 1949-3061Published: Piscataway IEEE 01.03.2016Published in IEEE transactions on smart grid (01.03.2016)“…To fully support information management among various stakeholders in smart grid domains, how to establish secure communication sessions has become an…”
Get full text
Journal Article -
18
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems
ISSN: 0920-5489, 1872-7018Published: Elsevier B.V 01.04.2024Published in Computer standards and interfaces (01.04.2024)“…Cloud-based data sharing systems (DSS) have become prevalent due to their ample storage and convenient access control. To protect sensitive data privacy in…”
Get full text
Journal Article -
19
A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System
ISSN: 1524-9050, 1558-0016Published: New York IEEE 01.07.2022Published in IEEE transactions on intelligent transportation systems (01.07.2022)“…The area of intelligent transport systems (ITS) is attracting growing attention because of the integration of the smart IoT with vehicles that improve user…”
Get full text
Journal Article -
20
Gait-Based Privacy Protection for Smart Wearable Devices
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 15.01.2024Published in IEEE internet of things journal (15.01.2024)“…Smart wearable devices (SWDs) collect and store sensitive daily information of many people. Its primary method of identification is still the password…”
Get full text
Journal Article