We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,771 results
  1. IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT

    Cross-platform difficulties, data privacy, and authentication security are common problems in the Internet of Things (IoT) environment. Despite the...

    Sisi Shao, Fei Chen, ... Fen Mei in World Wide Web
    Article 12 August 2021
  2. Cloud-Aided Scalable Revocable IBE with Ciphertext Update from Lattices in the Random Oracle Model

    Cloud-aided scalable revocable identity-based encryption with ciphertext update (CA-RIBE-CU), first introduced by Wang et al. in 2017 and the first...
    Yanhua Zhang, **meng Liu, ... Huiwen Jia in Frontiers in Cyber Security
    Conference paper 2024
  3. Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity

    Revocable identity-based encryption (RIBE) is an extension of IBE that satisfies a key revocation mechanism to manage a number of users dynamically...

    Atsushi Takayasu in Designs, Codes and Cryptography
    Article 05 June 2021
  4. Adaptively secure revocable hierarchical IBE from k-linear assumption

    Revocable identity-based encryption (RIBE) is an extension of IBE with an efficient key revocation mechanism. Revocable hierarchical IBE (RHIBE) is...

    Keita Emura, Atsushi Takayasu, Yohei Watanabe in Designs, Codes and Cryptography
    Article 15 May 2021
  5. More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model

    Identity-based encryption with equality test (IBEET) is a variant of identity-based encryption (IBE), where any users who have trapdoors can check...
    Kyoichi Asano, Keita Emura, Atsushi Takayasu in Information Security
    Conference paper 2022
  6. Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model

    In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-based encryption (GPV-IBE) scheme based on a post-quantum...

    Shuichi Katsumata, Shota Yamada, Takashi Yamakawa in Journal of Cryptology
    Article 06 January 2021
  7. Leakage-Resilient \(\mathsf {IBE}\) / \(\mathsf {ABE}\) with Optimal Leakage Rates from Lattices

    We derive the first adaptively secure \(\mathsf {IBE}\)...
    Qiqi Lai, Feng-Hao Liu, Zhedong Wang in Public-Key Cryptography – PKC 2022
    Conference paper 2022
  8. Anonymous IBE from PEKS: A Generic Construction

    Abdalla et al.[1, 6] proposed a transform of an anonymous IBE (A-IBE) scheme to a PEKS (Public key encryption with keyword search) scheme. Boneh et...
    Hyun Sook Rhee, Dong Hoon Lee in Information Security Applications
    Conference paper 2021
  9. IBE with Incompressible Master Secret and Small Identity Secrets

    Side-step** the protection provided by cryptography, exfiltration attacks are becoming a considerable real-world threat. With the goal of...
    Nico Döttling, Sanjam Garg, ... Mingyuan Wang in Theory of Cryptography
    Conference paper 2022
  10. Extended Galbraith’s test on the anonymity of IBE schemes from higher residuosity

    At PKC 2019, Clear and McGoldrick presented the first identity-based encryption (IBE) scheme that is group homomorphic for addition modulo a...

    **aopeng Zhao, Zhenfu Cao, ... Jun Shao in Designs, Codes and Cryptography
    Article 10 November 2020
  11. Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation

    In public key encryption (PKE), anonymity is essential to ensure privacy by preventing the ciphertext from revealing the recipient’s identity....
    Qi Wang, Haodong Huang, ... Qi Yuan in Computer Security – ESORICS 2023
    Conference paper 2024
  12. Lightweight Anonymous Communication Model Based on Anonymous IBE

    With increasing application of big data technology, a large amount of personal information is stored and processed on the Internet, which makes...
    Yanli Wang, **nying Yu, Fengyin Li in Cloud Computing
    Conference paper 2021
  13. Bounded Collusion ABE for TMs from IBE

    We give an attribute-based encryption system for Turing Machines that is provably secure assuming only the existence of identity-based encryption...
    Rishab Goyal, Ridwan Syed, Brent Waters in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  14. Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE

    Our context is anonymous encryption schemes hiding their receiver, but in a setting which allows authorities to reveal the receiver when needed....
    Yi Wang, Rongmao Chen, ... Moti Yung in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  15. Leakage-resilient identity-based cryptography from minimal assumptions

    Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...

    Yanwei Zhou, Bo Yang, ... Yi Mu in Designs, Codes and Cryptography
    Article 16 August 2023
  16. Identity-Based Encryption from LWE with More Compact Master Public Key

    This paper presents an adaptively secure identity-based encryption (IBE) scheme from Learning With Errors (LWE) in the standard model. Compared to...
    Conference paper 2024
  17. CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions

    Identity-based Matchmaking Encryption (IB-ME) is a new form of encryption that enables anonymous communication by specifying identities for both...
    Shen Lin, Yu Li, Jie Chen in Information Security and Cryptology
    Conference paper 2024
  18. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting

    We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many...

    Dennis Hofheinz, Jessica Koch, Christoph Striecks in Journal of Cryptology
    Article Open access 29 February 2024
Did you find what you were looking for? Share feedback.