2,231 Hits in 7.3 sec

Page 6509 of Mathematical Reviews Vol. , Issue 2003h [page]

2003 Mathematical Reviews  
The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem. Our system is based on the Weil pairing.  ...  {For the entire collection see MR 2003d:94001.} 2003h:94054 94A62 14G50 Boneh, Dan (1-STF-C; Stanford, CA); Franklin, Matt (1-CAD-C; Davis, CA) Identity-based encryption from the Weil pairing.  ... 

Survey on Identity based and Hierarchical Identity based Encryption Schemes

D. Kalyani, R. Sridevi
2016 International Journal of Computer Applications  
We also discuss Revocable Identity Based Encryption (RIBE) schemes from the view point of security models and constructions.  ...  Later, we discuss the hierarchical identity-based encryption (HIBE) present in standard model as well as in random oracle model.  ...  The Diffie-Hellman key agreement scheme based discrete logarithm problem: given p, g, and ga, find a.  ... 
doi:10.5120/ijca2016908158 fatcat:spjqzcascfe33djkrhcg3ej4mu

Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities

Deholo Nali, Ali Miri, Carlisle M. Adams
2004 Conference on Privacy, Security and Trust  
This paper presents the first mediated hierarchical identity-based encryption and signature schemes.  ...  scheme is strongly existentially unforgeable (assuming the difficulty of the computational Diffie-Hellman problem).  ...  In a nutshell, the encryption scheme is semantically secure with respect to adaptive chosen ciphertext attacks (assuming the difficulty of the Computational Bilinear Diffie-Hellman problem), and the signature  ... 
dblp:conf/pst/NaliMA04 fatcat:io6zbccocfeeddid44byzzl67a

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures [chapter]

Michael Braun, Ulrike Meyer, Susanne Wetzel
2010 Lecture Notes in Computer Science  
In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem while maintaining efficiency and identity privacy.  ...  The core of our solution is the use of the concepts of key-splitting and distributed signatures to solve the validation and revocation problem.  ...  The protocol roughly works as follows: Upon receiving the public Diffie-Hellman component from the tag, the reader signs both its public Diffie-Hellman component and that of the tag using its public key  ... 
doi:10.1007/978-3-642-12368-9_9 fatcat:ew2kqfqugja5lomh43wnozpdzi

Enhanced Attribute-Based Proxy Re-Encryption for Home Network

Jongseok Choi, Howon Kim
2013 International Journal of Computer and Communication Engineering  
In a string of the encryption schemes, we apply Attribute-Based Proxy Re-Encryption (ABPRE) to the network.  ...  For both access control and encryption, home network employs a series of Attribute-Based Encryption (ABE) schemes.  ...  The authors are with the Department of Computer Engineering, Pusan National University, Gumjeong-Gu, Busan, Korea (e-mail: jschoi85@, howonkim@  ... 
doi:10.7763/ijcce.2013.v2.192 fatcat:pnz5jt5u5rfldkihflm3bjk7fe

Effective and Secure Access Control for Multi-Authority Cloud Storage Systems

Lin Xin, Xingming Sun, Zhangjie Fu, Liang-A o Zhang, Jie Xi
2016 International Journal of Security and Its Applications  
The scheme adopts the Pedersen commitment in combination with the properties of bilinear-pairs on elliptic curve and bilinear Diffie-Hellman problem.  ...  The VSS scheme adopts the Pedersen commitment in combination with the properties of bilinear-pairs on elliptic curve and bilinear Diffie-Hellman problem. Copyright ⓒ 2016 SERSC 219 2.  ...  Acknowledgements This work is supported by the NSFC (61232016, U1405254, 61173141, 61173142, 61173136, 61373133) , 201301030, 2013DFG12860, BC2013012 and PAPD fund.  ... 
doi:10.14257/ijsia.2016.10.2.20 fatcat:vbwy753airbmdfoefxo2apwj7m

Public Key Encryption with Keyword Search in Cloud: A Survey

Yunhong Zhou, Na Li, Yanmei Tian, Dezhi An, Licheng Wang
2020 Entropy  
From a technological viewpoint, the existing PEKS schemes can be classified into several variants: PEKS based on public key infrastructure, PEKS based on identity-based encryption, PEKS based on attribute-based  ...  With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality.  ...  CDH refers to Computational Diffie-Hellman assumption. CBDH refers to Computational Bilinear Diffie-Hellman assumption.  ... 
doi:10.3390/e22040421 pmid:33286195 pmcid:PMC7516898 fatcat:qovvzpdonnbd5bswb7j7q5igiq

A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption [article]

Shuaiqi Hu
2015 arXiv   pre-print
Then a novel hierarchical key management scheme based on the basic Boneh-Franklin and Diffie-Hellman (DH) algorithms is proposed.  ...  This paper firstly reviews the identity-based encryption, particularly, the Boneh-Franklin algorithm.  ...  Secutity Model The security of the algorithm proposed in [8] lies on the Bilinear Diffie-Hellman (BDH) problems.  ... 
arXiv:1511.01808v3 fatcat:gkvbg56lwzh2dphul3ylud7hri

Cloud Data Integrity Auditing Over Dynamic Data for Multiple Users

Santhosh Kumar, Latha Parthiban
2017 International Journal of Intelligent Engineering and Systems  
Cloud computing is a state-of-the-art computing model, which encourages remote data storage. This facility shoots up the necessity of secure data auditing mechanism over outsourced data.  ...  The performance of the proposed work is analysed and compared with the existing techniques. The update time cost is lesser than the comparative techniques.  ...  Def.2. ℓ-Hidden Strong Diffie-Hellman problem Let ℊ be a group of order . The ℓ-Hidden Strong Diffie-Hellman problem with factors ( Def.3.  ... 
doi:10.22266/ijies2017.1031.26 fatcat:zlumclxyqzbn3hcvod7ursn35u

Recipient Revocable Identity-Based Broadcast Encryption

Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption scheme.  ...  In this notion, a content provider will produce encrypted content and send them to a third party (which is a broadcaster). This third party will be able to revoke some identities from the ciphertext.  ...  The (P, Q, F )-General Decision Diffie-Hellman Exponent ((P, Q, F )-GDDHE) problem is defined as follows.  ... 
doi:10.1145/2897845.2897848 dblp:conf/ccs/SusiloCGYMC16 fatcat:lcjefn6i5rglpju6ok5di6x2ru

A Multi Keyword Searchable Attribute-based Encryption Technique for Data Access Control in Cloud Storage

Prashant Mininath Mane
2020 International Journal of Advanced Trends in Computer Science and Engineering  
However, based on the idea of Bi-Linear (BL) and Bi-Linear Diffie -Hellman (BDH), our framework is proven to be safe toward specifically selected keyword attacks and selectively identified ciphertext attacks  ...  so that recipients may never extract confidential data from the ciphertext.  ...  Bilinear Diffie-Hellman (BDH) The BDH problem in is described as follows: (b, , , ) ∈ as input, calculate f (b, b) ∈ as input.  ... 
doi:10.30534/ijatcse/2020/104942020 fatcat:6pzotrjewzex3d6iulj6xpyo3q

Advanced Cipher-Text Policy Using Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing

2017 International Journal of Innovations in Engineering and Technology  
Our scheme provides security against chosen-plaintext attacks under the k-multi-linear Decisional Diffie-Hellman assumption.  ...  In the cloud, for getting access control and maintaining data secure and for the exactness of the secure computing results, the data owners has to kept attribute-based security to encrypt the stored data  ...  Proposed system uses the k-multi linear Decisional Diffie-Hellman algorithm in order to validate the security to the encrypted data.  ... 
doi:10.21172/ijiet.81.020 fatcat:vauzz2hnlzdtxgcolqtvn7qeni

A Security-Mediated Encryption Scheme Based on ElGamal Variant

Boon Chian Tea, Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd. Ghafar, Muhammad Asyraf Asbullah
2021 Mathematics  
Diffie-Hellman (CDH) problem.  ...  We show that the proposed security mediated encryption scheme is secure indistinguishably against chosen-ciphertext attack (IND-CCA) in the random oracle via the hardness assumption of the computational  ...  for giving the opportunity to conduct this research.  ... 
doi:10.3390/math9212642 fatcat:yigaq2gmbfgtfoiqgegx3l3y6y


Jasleen Saini .
2017 International Journal of Research in Engineering and Technology  
Also Diffie Hellman algorithm is used to make the data more secure.  ...  In this paper, key escrow problem is solved by using the scheme of homomorphic encryption in which mathematical operations are done on encrypted data without compromising the encryption and proxy re-encryption  ...  In SU Mang, LI Fenghua, SHI Guozhen, GENG Kui, XIONG Jinbo (2016) paper, the diffie hellman algorithm is used for attribute based encryption but it creates problem while generating a generator.  ... 
doi:10.15623/ijret.2017.0603013 fatcat:5g3ytg3vpzh35mk6eww64esyxu

Identity based Encryption with Cloud Revocation Authority

2019 International Journal of Engineering and Advanced Technology  
Recently, by embedding associate degree computation techniques has been into IBE, Li et al. proposed an Identity-based encryption theme along with a keyupdate cloud service supplier.  ...  Finally, we have a tendency to extend the proposed Identity-based encryption theme to gift a CRA cloud revocation authority authentication theme with limited privileges for an oversized range of assorted  ...  Devi, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences Identity based Encryption with Cloud Revocation AuthorityD.  ... 
doi:10.35940/ijeat.a1033.1291s219 fatcat:4mjitgovybfudh6bnv43xjpdlu
« Previous Showing results 1 — 15 out of 2,231 results