Public key infrastructure (PKI) model requires an authenticated public key for encryption that has to be obtained prior to initiating communication. The identity-based encryption (IBE) essentially removes the p
Abdalla et al. [16] defined the concept of Identity-Based Encryption with Keyword Search (IBEKS). Several IBEKS schemes have been proposed [17,18] inspired by the work of [16]. However, these schemes require a secure channel
1) Hierarchical Identity-based Encryption 基于等级身份加密 2) "基于(Jiyu)" “基于” 1. “基于(Jiyu)” and its English translation in titles of Chinese computing-technology periodicals; 计算技术类期刊论文题名中的“基于”及其相应英文译法
Forward security in Hierarchical Identity-Based Encryption Scheme在分层的基于身份的加密方案的前向安全性 热度: CCA-SecureHierarchicalIdentityBasedEncryptionWithout RandomOracle PalashSarkarandSanjitChatterjee AppliedStatisticsUnit IndianStatisticalInstitute
Forward security in Hierarchical Identity-Based Encryption Scheme在分层的基于身份的加密方案的前向安全性 热度: fuzzy identity-based encryption:基于模糊身份的加密 热度: identity-based encryption from the weil pairing:基于身份的加密从weil对 热度:
We elaborate Hierarchical Identity-Based Encryption (HIBE) with a new primitive referred to as Hierarchical Identity-Based Broadcast Encryption (HIBBE). Similar to HIBE, HIBBE organizes users in a tree-like structure and users can delegate their decrypti
In fact, it is known that some signature and encryption schemes demonstrated to be secure in the random oracle model are insecure when the random oracle is replaced by any actual hash function [15], [16]. Thus, it is meaningful and practical to construct an identity-based IPFE in the ...
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption (IBPRE), where a semi-trusted proxy with some information (a.k.a. re-encryption key), can transform a ciphertext under an identity to another ciphertext under another identity with the same plaintext. ...
We present hierarchical identity-based encryption schemes and signature schemes that have total collusion resistance on an arbitrary number of levels and that have chosen ciphertext security in the random oracle model assuming the difficulty of the Bilinear Diffie- Hellman problem. 机译:我们提出了基...
1.1 Identity-Based Encryption In traditional public key encryption, Bob's public key is a random string unre- lated to his identity. When Alice wants to send a message to Bob, she must first obtain Bob's authenticated public key. Typical solutions to this problem involve public key ...