Filters








38,752 Hits in 4.0 sec

A Fully Secure Revocable ID-Based Encryption in the Standard Model

Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu
2012 Informatica  
We demonstrate that the proposed RIBE is semantically secure against adaptive-ID attacks in the standard model.  ...  In the past, there was little work on studying the revocation problem of ID-based public key systems.  ...  The authors would like to thank the anonymous referees for their valuable comments and constructive suggestions.  ... 
doi:10.15388/informatica.2012.371 fatcat:7xxala7nezboxkodwmzq5id4ke

Provably secure revocable ID-based signature in the standard model

Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu
2013 Security and Communication Networks  
We demonstrate that the proposed RIBE is semantically secure against adaptive-ID attacks in the standard model.  ...  In the past, there was little work on studying the revocation problem of ID-based public key systems.  ...  The authors would like to thank the anonymous referees for their valuable comments and constructive suggestions.  ... 
doi:10.1002/sec.696 fatcat:qfl3odugejg2bi6g6l5fvcuifu

An Efficient Ensemble Architecture for Privacy and Security of Electronic Medical Records

Ömer Kasım
2022 ˜The œinternational Arab journal of information technology  
Electronic medical records, one of the sensitive data, are stored in public or private cloud service providers.  ...  In this system, writing and updating requests are encrypted asymmetrically, and reading requests were encrypted symmetrically. This solution distinguishes the proposed method from previous studies.  ...  The update query encrypted with public and private key is asymmetrically encrypted. 0.022 sec is spent in the query made to see data in only one field.  ... 
doi:10.34028/iajit/19/2/14 fatcat:oeg2ficbenhu3l7q4765ua37im

Identity based Encryption with Cloud Revocation Authority

2019 International Journal of Engineering and Advanced Technology  
Identity-based coding/encryption (IBE) is a public key encrypted system that take outs the strain of public key infrastructure (PKI) and certified administration in standard crypto public key settings.  ...  In this public key system is not used, the downside may be a crucial thing in IBE settings. Many IBE schemes are proposed relating to this issue.  ...  INTRODUCTION Identity-based coding/encryption (IBE) is a public key encrypted system that take outs the strain of public key infrastructure (PKI) and certified administration in standard crypto public  ... 
doi:10.35940/ijeat.a1033.1291s219 fatcat:4mjitgovybfudh6bnv43xjpdlu

Construction for Searchable Encryption with Strong Security Guarantees

István Vajda
2019 International Journal of Computer Network and Information Security  
Our construction is secure in the standard model of computation assuming bilinear groups with the widely used Symmetric eXternal Diffie Hellmann (SXDH) assumption.  ...  Attacks via searching for patterns in the database is prevented by randomized keyword encryption and trapdoor generation.  ...  In [12] proofs are given in the non-standard model of computation (in the random oracle model), while we work in the standard model.  ... 
doi:10.5815/ijcnis.2019.05.01 fatcat:s74ai52jfjct3d6g4bwaokr6ly

SDS: A Framework for Secure Data Sharing in Database as a Service

R. Muthuram, Dr.G. Kousalya
2017 Bonfring International Journal of Data Mining  
The service provider performs the second level encryption with user's proxy key which is unique to the users.  ...  In this paper, we present a novel approach to flexible data access control with re-encryption performed by the service provider.  ...  Public key approach and 2.Multi key approach. a. Public Key Approach In this approach, the data owner applies the proxy encryption mechanism directly.  ... 
doi:10.9756/bijdm.8306 fatcat:dab6q56mvzam5mnsjvlfwcmxuu

RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE

Tung-Tso TSAI, Yuh-Min TSENG, Tsu-Yang WU
2014 Informatica  
We demonstrate that the proposed RHIBE scheme is fully secure while removing the requirement of secure channels for private key updating in Boneh and Franklin's revocation method.  ...  Up to now, there was very little work on studying the revocation problem in existing hierarchical ID-based encryption (HIBE) systems.  ...  The authors would like to thank the anonymous referees for their valuable comments and constructive suggestions.  ... 
doi:10.15388/informatica.2014.16 fatcat:7eaihyb7fneqvd3ipt3mx5pm2y

Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating

Takeru Naruse, Masami Mohri, Yoshiaki Shiraishi
2015 Human-Centric Computing and Information Sciences  
In CP-ABE, the data owner encrypts data under the access structure over attributes and a set of attributes assigned to users is embedded in user's secret key.  ...  The data owner chooses an access structure and encrypts message under the access structure. The set of attributes assigned to users is embedded in his secret key.  ...  under the standard model [2, 5] .  ... 
doi:10.1186/s13673-015-0027-0 fatcat:d74dfshzubfg7byu4yyywsx4dy

Securing E-health Data using Ciphertext-Policy Attribute-Based Encryption with Dynamic User Revocation

2019 International journal of recent technology and engineering  
The Ciphertext Policy Attribute-Based Encryption (CP-ABE) is commonly utilized in such a setting, which provides role-based and fine-grained access control over encrypted data.  ...  In this paper, we proposed a CP-ABE based access control model to support user revocation efficiently. Specifically, the proposed model associates a unique identifier to each user.  ...  ACKNOWLEDGMENTS The authors are grateful to the Applied Science Private University, Amman-Jordan, for the full financial support granted to cover the publication fee of this research article.  ... 
doi:10.35940/ijrte.c6309.098319 fatcat:t2qimtkffffbzdcfxpmwao66fm

Secured Information Sharing in Mobile Cloud Computing using Access Controls

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Furthermore, this method suffers a trade-off between accuracy and privacy and most of the research work focused on key management issues and static access policies but due to user dynamic the access control  ...  cipher text policy-Attribute based encryption (HCP-ABE), it derived from classic ABE.  ...  Mobile cloud computing (MCC) has many security models in first the security done with either symmetric encryption or asymmetric encryption, in first scenario the owner encrypt data with secrete key after  ... 
doi:10.35940/ijitee.l3120.1081219 fatcat:ngakwghi6fdv5omrcxykoilyfm

Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR

Xixi Yan, Hao Ni, Yuan Liu, Dezhi Han
2019 Computer Science and Information Systems  
Considering that privacy preservation and policy updating are the key problems in PHR, a privacy-preserving multiauthority attribute-based encryption scheme with dynamic policy updating in PHR was proposed  ...  Attribute-Based Encryption (ABE), as a new public key cryptosystem that guarantees fine-grained access control of outsourced encrypted data, has been used to design the PHR system.  ...  In terms of security, the [8, 15] are only secure under the random oracle model. Our scheme and the schemes in [10, 11, 16, 17, 19] are secure under the standard model.  ... 
doi:10.2298/csis180830029y fatcat:tajdq5k2e5advabo5vnorxjo6e

Incremental Deterministic Public-Key Encryption [chapter]

Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev
2012 Lecture Notes in Computer Science  
Our second scheme is based on the Decisional Diffie-Hellman assumption in the standard model.  ...  We present a framework for modeling the incrementality of deterministic public-key encryption.  ...  Modeling Incremental Deterministic Public-Key Encryption In this section we present a framework for modeling the incrementality of deterministic public-key encryption schemes.  ... 
doi:10.1007/978-3-642-29011-4_37 fatcat:buaypxu4tzgwdmofggltctx3iq

Secure Data Access Control with Cipher Text Update and Computation Outsourcing in Fog Computing for Internet of Things

Shaik Jaffer Vali , Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
The proposed conspire is demonstrated to be secure in the standard model and can give trait repudiation and public unquestionable status.  ...  In this paper, we propose the Novel cipher text-based encryption model (NCEM) which has an information access control plot dependent on Ciphertext-Policy it give information privacy, fine-grained control  ...  Methodology System Model In this proposed model, the trait authority is a completely confided in party which is accountable for creating framework boundaries just as mystery key for every client.  ... 
doi:10.17762/turcomat.v12i2.1441 fatcat:tocwjrrwxrd2fkd5eblkzy3m3e

Incremental Deterministic Public-Key Encryption

Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev
2017 Journal of Cryptology  
Our second scheme is based on the Decisional Diffie-Hellman assumption in the standard model.  ...  We present a framework for modeling the incrementality of deterministic public-key encryption.  ...  Modeling Incremental Deterministic Public-Key Encryption In this section we present a framework for modeling the incrementality of deterministic public-key encryption schemes.  ... 
doi:10.1007/s00145-017-9252-1 fatcat:cvbtrmjckbgkfcs6hi6dfvybkq

A Scalable and Secure Group Key Management Method for Secure V2V Communication

Hayotjon Aliev, HyungWon Kim, Sunghyun Choi
2020 Sensors  
In addition, the proposed method employs a lightweight matrix-based encryption algorithm that can be easily applicable with the proposed group key management method.  ...  The simulation results show that the proposed method can reduce computation time for group key generation and message encryption by more than 80% compared to existing methods.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20216137 pmid:33126693 fatcat:movv5iwt2jetnodveirrnftxlu
« Previous Showing results 1 — 15 out of 38,752 results