机译:学习完美安全的密码学以对抗性神经密码学保护通信 7. Hierarchical ID-based cryptography [O] . Craig Gentry, Alice Silverberg 2002 机译:基于分层ID的加密 8. Towards a Hierarchy of Cryptographic Protocol Models [R] . Meadows, C. 2003 机译:迈向密码协议模型的层次结构 AI...
VijayBabu, "Data Storage Security In Cloud By Using Jar Files And Hierarchical Id- Based Cryptography", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 2, no. 1, (2013) January.Ms.R.Punitha, Mr.D.Vijaybabu, „Data Storage Security In Cloud...
Keywords: identity-based cryptography, hierarchical identity-based cryptography, elliptic curves, pairings 1 Introduction 1.1 Identity-Based Encryption This paper answers in the affirmative the question of whether ID-based encryption can be made hierarchical while remaining secure and efficient. In tra...
To incorporate keyword search functionality in the asymmetric cryptography setting Boneh et al. [2] defined the concept of Public key Encryption with Keyword Search (PEKS) and proposed a PEKS scheme. In 2008, Baek et al. [3] discovered that the PEKS model proposed by Boneh et al. requires ...
Hierarchical ID-based cryptography was first proposed in Gentry and Silverberg, 2002, Horwitz and Lynn, 2002. It is a generalization of IBE that mirrors an organizational hierarchy. It allows a root PKG to distribute workload by delegating private key generation and entity authentication tasks to ...
Based on the aggregate signature scheme [Boneh Gentry Shacham Lynn 03] Standard assumptions for pairing-based cryptography Overview: Anonymous-signer aggregate signature scheme Long-term public-key Public-key certificate Trusted third-party Certifies ...
We elaborate Hierarchical Identity-Based Encryption (HIBE) with a new primitive referred to as Hierarchical Identity-Based Broadcast Encryption (HIBBE). Similar to HIBE, HIBBE organizes users in a tree-like structure and users can delegate their decrypti
Cryptosystems fundamentally deal with the issue of securing data communication. Public key infrastructure (PKI) model requires an authenticated public key for encryption that has to be obtained prior to initiating communication. The identity-based encryp
Gentry, C., Halevi, S.: Hierarchical identity-based encryption with polynomially many levels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 437–456. Springer, Heidelberg (2009) 12. Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ...