نتایج جستجو برای: واژگان کلیدی ibe

تعداد نتایج: 50206  

2003
Marco Casassa Mont Pete Bramhall

Identifier-based Encryption (IBE) is an emerging cryptography schema. As it happens for new technologies, there are ongoing debates about its usefulness and best usage. This paper describes some practical applications of IBE, in the areas of confidentiality enforcement, privacy and identity management. These applications include: a service for timed release of confidential information; a secure...

2004
Zhaohui Cheng Richard Comley Luminita Vasiu

Key escrow is an inherent property in the current proposed Identity-Based Encryption (IBE) systems. However the key escrow is not always a good property for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystem...

2012
Suresh Kumar

Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have th...

Journal: :IACR Cryptology ePrint Archive 2007
Leonardo B. Oliveira Diego F. Aranha Eduardo Morais Felipe Daguano Julio López Hernandez Ricardo Dahab

In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the advent of Identity-Based Encryption (IBE) has enabled a wide range of new cryptographic solutions. In this work, we argue that IBE is ideal for WSNs and vice versa. We discuss the synergy between the systems, describe...

2010
Yannis Rouselakis

The notion of identity-based encryption (IBE) was proposed as an economical alternative to public-key infrastructures. IBE is also a useful building block in various cryptographic primitives such as searchable encryption. A generalization of IBE is attribute-based encryption (ABE). A major application of ABE is fine-grained cryptographic access control of data. Research on these topics is still...

Journal: :IACR Cryptology ePrint Archive 2016
Daniel Apon Xiong Fan Feng-Hao Liu

We construct an identity-based encryption (IBE) scheme from the standard Learning with Errors (LWE) assumption, which both has a compact public-key (with size similar to known lattice-based PKE schemes) and also achieves adaptive security in the standard model. This improves over previous IBE schemes from lattices, which either have a public key that grows at least linearly with the length of t...

Journal: :International Business Review 2021

International business education (IBE) scholarship is extensive and continuously growing. Nevertheless, to date there no systems perspective overview of the literature dedicated this topic. Using latest advancements in scientometric analysis, study structures visualizes entire IBE scholarship, which allows identify gaps research propose a number future directions. Data extracted from 894 peer-r...

Journal: :IACR Cryptology ePrint Archive 2011
Yu Chen Liqun Chen Zhong Chen

We show that Katz-Wang’s duplicating key and ciphertext technique can be extended to a generic method that can be used in a certain category of Identity-Based Encryption (IBE) schemes for the purposes of improving their security reductions. We further develop two refined approaches by adapting the randomness reuse technique in the Katz-Wang technique: one is public key duplication, and the othe...

2016
Khoa Nguyen Huaxiong Wang Juanyang Zhang

Server-aided revocable identity-based encryption (SR-IBE), recently proposed by Qin et al. at ESORICS 2015, offers significant advantages over previous user revocation mechanisms in the scope of IBE. In this new system model, almost all the workloads on users are delegated to an untrusted server, and users can compute decryption keys at any time period without having to communicate with either ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید