Hierarchical ID-Based Cryptography Craig Gentry1 and Alice Silverberg2, 1 DoCoMo USA Labs, San Jose, CA, USA, cgentry@docomolabs-usa.com 2 Department of Mathematics, Ohio State University, Columbus, OH, USA, si
机译:学习完美安全的密码学以对抗性神经密码学保护通信 7. Hierarchical ID-based cryptography [O] . Craig Gentry, Alice Silverberg 2002 机译:基于分层ID的加密 8. Towards a Hierarchy of Cryptographic Protocol Models [R] . Meadows, C. 2003 机译:迈向密码协议模型的层次结构 AI...
Keywords: identity-based cryptography, hierarchical identity-based cryptography, elliptic curves, pairings 1 Introduction 1.1 Identity-Based Encryption This paper answers in the affirmative the question of whether ID-based encryption can be made hierarchical while remaining secure and efficient. In tra...
VijayBabu, "Data Storage Security In Cloud By Using Jar Files And Hierarchical Id- Based Cryptography", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 2, no. 1, (2013) January.Ms.R.Punitha, Mr.D.Vijaybabu, „Data Storage Security In Cloud...
To incorporate keyword search functionality in the asymmetric cryptography setting Boneh et al. [2] defined the concept of Public key Encryption with Keyword Search (PEKS) and proposed a PEKS scheme. In 2008, Baek et al. [3] discovered that the PEKS model proposed by Boneh et al. requires ...
(2002). Hierarchical ID-based cryptography. In Proceedings of ASIACRYPT 2002, Queenstown, New Zealand, December 1–5 (pp. 548–566). Google Scholar Hanaoka, G., Nishioka, T., Zheng, Y., & Imai, H. (1999). An efficient hierarchical identity based key-sharing method resistant against ...
Based on the aggregate signature scheme [Boneh Gentry Shacham Lynn 03] Standard assumptions for pairing-based cryptography Overview: Anonymous-signer aggregate signature scheme Long-term public-key Public-key certificate Trusted third-party Certifies ...
We elaborate Hierarchical Identity-Based Encryption (HIBE) with a new primitive referred to as Hierarchical Identity-Based Broadcast Encryption (HIBBE). Similar to HIBE, HIBBE organizes users in a tree-like structure and users can delegate their decrypti
Strauss, Divertible protocols and atomic proxy cryptography, in: EUROCRYPT 1998, LNCS, vol... R. Canetti, S. Halevi, J. Katz, Chosen-ciphertext security from identity-based encryption, in: EUROCRYPT 2004, LNCS,... R. Canetti, S. Hohenberger, Chosen-ciphertext secure proxy re-encryption, ...