Search Results - "Identity Based Encryption"

Refine Results
  1. 1

    Tightly secure (H)IBE in the random oracle model by Chu, Qiaohan, Chen, Jie

    ISSN: 0304-3975, 1879-2294
    Published: Elsevier B.V 29.07.2024
    Published in Theoretical computer science (29.07.2024)
    “…We present an adaptively secure identity-based encryption (IBE) scheme with constant sized parameters and constant security loss in multi-instance…”
    Get full text
    Journal Article
  2. 2

    Cloud‐aided scalable revocable identity‐based encryption scheme with ciphertext update by Wang, Changji, Li, Yuan, Fang, Jian, Xie, Jianguo

    ISSN: 1532-0626, 1532-0634
    Published: Hoboken Wiley Subscription Services, Inc 25.10.2017
    Published in Concurrency and computation (25.10.2017)
    “…Summary Key revocation and ciphertext update are two critical issues for identity‐based encryption schemes. Designing an identity‐based encryption scheme with…”
    Get full text
    Journal Article
  3. 3

    Designated-server identity-based authenticated encryption with keyword search for encrypted emails by Li, Hongbo, Huang, Qiong, Shen, Jian, Yang, Guomin, Susilo, Willy

    ISSN: 0020-0255, 1872-6291
    Published: Elsevier Inc 01.05.2019
    Published in Information sciences (01.05.2019)
    “…In encrypted email system, how to search over encrypted cloud emails without decryption is an important and practical problem. Public key encryption with…”
    Get full text
    Journal Article
  4. 4

    Provably Secure Authenticated Key Agreement Scheme for Smart Grid by Odelu, Vanga, Das, Ashok Kumar, Wazid, Mohammad, Conti, Mauro

    ISSN: 1949-3053, 1949-3061
    Published: IEEE 01.05.2018
    Published in IEEE transactions on smart grid (01.05.2018)
    “…Due to the rapid development of wireless communication systems, authentication becomes a key security component in smart grid environments. Authentication then…”
    Get full text
    Journal Article
  5. 5

    A Semi-Centralized Dynamic Key Management Framework for In-Vehicle Networks by Carvajal-Roca, Ivan E., Wang, Jian, Du, Jun, Wei, Shuangqing

    ISSN: 0018-9545, 1939-9359
    Published: New York IEEE 01.10.2021
    Published in IEEE transactions on vehicular technology (01.10.2021)
    “…The current in-vehicle network lacks a robust security communication mechanism between Electronic Control Units (ECUs). Although different proposed frameworks…”
    Get full text
    Journal Article
  6. 6

    Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage by Zhang, Xiaojun, Tang, Yao, Wang, Huaxiong, Xu, Chunxiang, Miao, Yinbin, Cheng, Hang

    ISSN: 0020-0255, 1872-6291
    Published: Elsevier Inc 01.08.2019
    Published in Information sciences (01.08.2019)
    “…•We propose an efficient proxy-oriented identity-based encryption with keyword search scheme (PO-IBEKS) from lattices.•PO-IBEKS enables an original data owner…”
    Get full text
    Journal Article
  7. 7

    Algorithm Substitution‐Resistant SM9‐Based Searchable Encryption With Cryptographic Reverse Firewall for Cloud Storage by Gao, Gaimei, Duan, Mingbo, Xun, Yaling, Liu, Chunxia, Dang, Weichao

    ISSN: 1532-0626, 1532-0634
    Published: Hoboken, USA John Wiley & Sons, Inc 15.05.2025
    Published in Concurrency and computation (15.05.2025)
    “…To protect data privacy in cloud storage, sensitive data is commonly encrypted before being uploaded to a cloud storage server (CSS). This process challenges…”
    Get full text
    Journal Article
  8. 8

    An Efficient Multiuser Threshold–Based Dynamic Cipher Puzzle With Secure Key Generation for DoS Attacks in Smart Grid Applications by Sumalatha, N., Baskaran, K.

    ISSN: 2161-3915, 2161-3915
    Published: Chichester, UK John Wiley & Sons, Ltd 01.07.2025
    “…Denial‐of‐service (DoS) attacks in smart grid applications involve malicious attempts to disrupt or compromise the availability and functionality of the grid's…”
    Get full text
    Journal Article
  9. 9

    Public key encryption with equality test in the standard model by Lee, Hyung Tae, Ling, San, Seo, Jae Hong, Wang, Huaxiong, Youn, Taek-Young

    ISSN: 0020-0255, 1872-6291
    Published: Elsevier Inc 01.04.2020
    Published in Information sciences (01.04.2020)
    “…Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users Ui to perform equality…”
    Get full text
    Journal Article
  10. 10

    Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey by Ullah, Shamsher, Zheng, Jiangbin, Din, Nizamud, Hussain, Muhammad Tanveer, Ullah, Farhan, Yousaf, Mahwish

    ISSN: 1574-0137, 1876-7745
    Published: Elsevier Inc 01.02.2023
    Published in Computer science review (01.02.2023)
    “…Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve Cryptography (ECC). EC is often used to improve the security of open…”
    Get full text
    Journal Article
  11. 11

    Efficient and secure identity-based encryption scheme with equality test in cloud computing by Wu, Libing, Zhang, Yubo, Choo, Kim-Kwang Raymond, He, Debiao

    ISSN: 0167-739X, 1872-7115
    Published: Elsevier B.V 01.08.2017
    Published in Future generation computer systems (01.08.2017)
    “…Efficient searching on encrypted data outsourced to the cloud remains a research challenge. Identity-based encryption with equality test (IBEET) scheme has…”
    Get full text
    Journal Article
  12. 12

    A continuous leakage-amplified IBE scheme with perfect key update by Qiao, Zirui, Yu, Yong, Zhou, Yanwei, Zheng, Dong

    ISSN: 0304-3975
    Published: Elsevier B.V 09.11.2025
    Published in Theoretical computer science (09.11.2025)
    “…In the practical deployment of cryptographic solutions, diverse applications pose unique challenges in terms of leakage resilience. The one-size-fits-all…”
    Get full text
    Journal Article
  13. 13

    Privacy-Preserving Identity-Based Data Rights Governance for Blockchain-Empowered Human-Centric Metaverse Communications by Zhang, Chuan, Zhao, Mingyang, Zhang, Weiting, Fan, Qing, Ni, Jianbing, Zhu, Liehuang

    ISSN: 0733-8716, 1558-0008
    Published: New York IEEE 01.04.2024
    “…Metaverse provides human-centric immersive communication experiences where humans can teleport across different virtual landscapes and build real-time…”
    Get full text
    Journal Article
  14. 14

    Identity-Based Encryption with Outsourced Revocation in Cloud Computing by Li, Jin, Li, Jingwei, Chen, Xiaofeng, Jia, Chunfu, Lou, Wenjing

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.02.2015
    Published in IEEE transactions on computers (01.02.2015)
    “…Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to…”
    Get full text
    Journal Article
  15. 15

    P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption by Maiti, Sumana, Misra, Sudip

    ISSN: 0018-9545, 1939-9359
    Published: New York IEEE 01.05.2020
    Published in IEEE transactions on vehicular technology (01.05.2020)
    “…This paper proposes Privacy Preserving Identity-Based Broadcast Proxy Re-encryption (P2B) - a scheme to provide privacy preserving in identity-based broadcast…”
    Get full text
    Journal Article
  16. 16

    Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database by Chatterjee, Urbi, Govindan, Vidya, Sadhukhan, Rajat, Mukhopadhyay, Debdeep, Chakraborty, Rajat Subhra, Mahata, Debashis, Prabhu, Mukesh M.

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.05.2019
    “…Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of…”
    Get full text
    Journal Article
  17. 17

    Secure Anonymous Key Distribution Scheme for Smart Grid by Tsai, Jia-Lun, Lo, Nai-Wei

    ISSN: 1949-3053, 1949-3061
    Published: Piscataway IEEE 01.03.2016
    Published in IEEE transactions on smart grid (01.03.2016)
    “…To fully support information management among various stakeholders in smart grid domains, how to establish secure communication sessions has become an…”
    Get full text
    Journal Article
  18. 18

    Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems by Liu, Zi-Yuan, Mambo, Masahiro, Tso, Raylin, Tseng, Yi-Fan

    ISSN: 0920-5489, 1872-7018
    Published: Elsevier B.V 01.04.2024
    Published in Computer standards and interfaces (01.04.2024)
    “…Cloud-based data sharing systems (DSS) have become prevalent due to their ample storage and convenient access control. To protect sensitive data privacy in…”
    Get full text
    Journal Article
  19. 19

    A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System by Zhou, Zhili, Gaurav, Akshat, Gupta, Brij Bhooshan, Lytras, Miltiadis D., Razzak, Imran

    ISSN: 1524-9050, 1558-0016
    Published: New York IEEE 01.07.2022
    “…The area of intelligent transport systems (ITS) is attracting growing attention because of the integration of the smart IoT with vehicles that improve user…”
    Get full text
    Journal Article
  20. 20

    Gait-Based Privacy Protection for Smart Wearable Devices by Su, Yu, Li, Yongjiao, Cao, Zhu

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 15.01.2024
    Published in IEEE internet of things journal (15.01.2024)
    “…Smart wearable devices (SWDs) collect and store sensitive daily information of many people. Its primary method of identification is still the password…”
    Get full text
    Journal Article