Anonymous Identity-Based Encryption can protect privacy of the receiver. However, there are some situations that we need to re- cover the identity of the receiver, for example a dispute occurs or the privacy me
Identity-based encryption (IBE), introduced by Shamir, eliminates the need for public-key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key. In particular, when ciphertexts of an ...
we present a novel anonymous identity-based encryption scheme. Our scheme comes from the analysis of Boyen-Waters anonymous IBE Scheme in which we find a method to construct anonymous IBE schemes. We show that Boyen-Waters anonymous
Certificateless encryption is used to grant user anonymity during authentication between the WBAN user and the access point. This is achieved by allowing the client to use a private key to sign a pseudo-identity, and sends this to the access point. When the access point receives the ...
Spatial encryption, which is a kind of functional encryption, provides a generalized framework for special property encryption schemes such as broadcast encryption, predicate encryption, forward secure encryption, (hierarchical) identity-based encryption, delegatable attribute-based encryption etc. In this ...
Considerable authority ciphertext policy that prioritizes privacy Li et al. [16] developed Attribute-based encryption (ABE) to encrypt attribute data with ciphertext and track down the identity of a dishonest user who divulges the decryption key. This system was designed to track a fraudulent use...
In this paper, we present an improved certificateless-based authentication and aggregate signature scheme, which can properly solve the coalition attack. Moreover, the proposed scheme not only uses pseudonyms in communications to prevent vehicles from revealing their identity but also achieves considerable...
Virtual private networks protect your data and your identity so you can roam the online world worry-free. VPNs use different standards of encryption to make sure no one can intercept your information and even if they somehow do, they can’t decipher what it says. ...
Boneh D and Franklin M (2001) ‘Identity-based encryption from the Weil pairing’ in Advances in Cryptology-CRYPTO: Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, USA, vol. 2139:213–229. Cygwin: Linux Environment Emulator for Windows. [Online] http://...
In this paper, we developed a new secure anonymous authentication scheme for mobile roaming services using an identity-based pairings encryption scheme and an identity-based ECC batch signature scheme. The proposed scheme does not need the help of the home server during authentication, and gives bet...