identity-based cryptography; hierarchical identity-based cryptography; elliptic curves; pairing-based cryptography; 机译:基于身份的密码学;基于分层身份的加密;椭圆曲线基于配对的密码学; 入库时间 2022-08-26 14:11:46 相似文献 外文文献 中文文献 专利 1. Parallel Key Insulated ID-Based Public Key ...
VijayBabu, "Data Storage Security In Cloud By Using Jar Files And Hierarchical Id- Based Cryptography", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 2, no. 1, (2013) January.Ms.R.Punitha, Mr.D.Vijaybabu, „Data Storage Security In Cloud...
Keywords: identity-based cryptography, hierarchical identity-based cryptography, elliptic curves, pairings 1 Introduction 1.1 Identity-Based Encryption This paper answers in the affirmative the question of whether ID-based encryption can be made hierarchical while remaining secure and efficient. In tra...
To incorporate keyword search functionality in the asymmetric cryptography setting Boneh et al. [2] defined the concept of Public key Encryption with Keyword Search (PEKS) and proposed a PEKS scheme. In 2008, Baek et al. [3] discovered that the PEKS model proposed by Boneh et al. requires ...
Gentry C., Silverberg A.: Hierarchical id-based cryptography. In: Advances in Cryptology—ASIACRYPT 2002, pp. 548–566 (2002). 18.Gentry C., Peikert C., Vaikuntanathan V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on ...
Based on the aggregate signature scheme [Boneh Gentry Shacham Lynn 03] Standard assumptions for pairing-based cryptography Overview: Anonymous-signer aggregate signature scheme Long-term public-key Public-key certificate Trusted third-party Certifies ...
In this paper, we propose a new identity-based parallel key-insulated encryption (IBPKIE) scheme which achieves IND-ID-KI-CCA2 security without random oracles. Our IBPKIE scheme has short public parameters and a tight reduction with an additive factor. Hierarchical identity-based cryptography was...
We elaborate Hierarchical Identity-Based Encryption (HIBE) with a new primitive referred to as Hierarchical Identity-Based Broadcast Encryption (HIBBE). Similar to HIBE, HIBBE organizes users in a tree-like structure and users can delegate their decrypti
Cryptosystems fundamentally deal with the issue of securing data communication. Public key infrastructure (PKI) model requires an authenticated public key for encryption that has to be obtained prior to initiating communication. The identity-based encryption (IBE) essentially removes the public key distrib...