A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Fully Secure Revocable ID-Based Encryption in the Standard Model
2012
Informatica
We demonstrate that the proposed RIBE is semantically secure against adaptive-ID attacks in the standard model. ...
In the past, there was little work on studying the revocation problem of ID-based public key systems. ...
The authors would like to thank the anonymous referees for their valuable comments and constructive suggestions. ...
doi:10.15388/informatica.2012.371
fatcat:7xxala7nezboxkodwmzq5id4ke
Provably secure revocable ID-based signature in the standard model
2013
Security and Communication Networks
We demonstrate that the proposed RIBE is semantically secure against adaptive-ID attacks in the standard model. ...
In the past, there was little work on studying the revocation problem of ID-based public key systems. ...
The authors would like to thank the anonymous referees for their valuable comments and constructive suggestions. ...
doi:10.1002/sec.696
fatcat:qfl3odugejg2bi6g6l5fvcuifu
An Efficient Ensemble Architecture for Privacy and Security of Electronic Medical Records
2022
˜The œinternational Arab journal of information technology
Electronic medical records, one of the sensitive data, are stored in public or private cloud service providers. ...
In this system, writing and updating requests are encrypted asymmetrically, and reading requests were encrypted symmetrically. This solution distinguishes the proposed method from previous studies. ...
The update query encrypted with public and private key is asymmetrically encrypted. 0.022 sec is spent in the query made to see data in only one field. ...
doi:10.34028/iajit/19/2/14
fatcat:oeg2ficbenhu3l7q4765ua37im
Identity based Encryption with Cloud Revocation Authority
2019
International Journal of Engineering and Advanced Technology
Identity-based coding/encryption (IBE) is a public key encrypted system that take outs the strain of public key infrastructure (PKI) and certified administration in standard crypto public key settings. ...
In this public key system is not used, the downside may be a crucial thing in IBE settings. Many IBE schemes are proposed relating to this issue. ...
INTRODUCTION Identity-based coding/encryption (IBE) is a public key encrypted system that take outs the strain of public key infrastructure (PKI) and certified administration in standard crypto public ...
doi:10.35940/ijeat.a1033.1291s219
fatcat:4mjitgovybfudh6bnv43xjpdlu
Construction for Searchable Encryption with Strong Security Guarantees
2019
International Journal of Computer Network and Information Security
Our construction is secure in the standard model of computation assuming bilinear groups with the widely used Symmetric eXternal Diffie Hellmann (SXDH) assumption. ...
Attacks via searching for patterns in the database is prevented by randomized keyword encryption and trapdoor generation. ...
In [12] proofs are given in the non-standard model of computation (in the random oracle model), while we work in the standard model. ...
doi:10.5815/ijcnis.2019.05.01
fatcat:s74ai52jfjct3d6g4bwaokr6ly
SDS: A Framework for Secure Data Sharing in Database as a Service
2017
Bonfring International Journal of Data Mining
The service provider performs the second level encryption with user's proxy key which is unique to the users. ...
In this paper, we present a novel approach to flexible data access control with re-encryption performed by the service provider. ...
Public key approach and 2.Multi key approach.
a. Public Key Approach In this approach, the data owner applies the proxy encryption mechanism directly. ...
doi:10.9756/bijdm.8306
fatcat:dab6q56mvzam5mnsjvlfwcmxuu
RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE
2014
Informatica
We demonstrate that the proposed RHIBE scheme is fully secure while removing the requirement of secure channels for private key updating in Boneh and Franklin's revocation method. ...
Up to now, there was very little work on studying the revocation problem in existing hierarchical ID-based encryption (HIBE) systems. ...
The authors would like to thank the anonymous referees for their valuable comments and constructive suggestions. ...
doi:10.15388/informatica.2014.16
fatcat:7eaihyb7fneqvd3ipt3mx5pm2y
Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
2015
Human-Centric Computing and Information Sciences
In CP-ABE, the data owner encrypts data under the access structure over attributes and a set of attributes assigned to users is embedded in user's secret key. ...
The data owner chooses an access structure and encrypts message under the access structure. The set of attributes assigned to users is embedded in his secret key. ...
under the standard model [2, 5] . ...
doi:10.1186/s13673-015-0027-0
fatcat:d74dfshzubfg7byu4yyywsx4dy
Securing E-health Data using Ciphertext-Policy Attribute-Based Encryption with Dynamic User Revocation
2019
International journal of recent technology and engineering
The Ciphertext Policy Attribute-Based Encryption (CP-ABE) is commonly utilized in such a setting, which provides role-based and fine-grained access control over encrypted data. ...
In this paper, we proposed a CP-ABE based access control model to support user revocation efficiently. Specifically, the proposed model associates a unique identifier to each user. ...
ACKNOWLEDGMENTS The authors are grateful to the Applied Science Private University, Amman-Jordan, for the full financial support granted to cover the publication fee of this research article. ...
doi:10.35940/ijrte.c6309.098319
fatcat:t2qimtkffffbzdcfxpmwao66fm
Secured Information Sharing in Mobile Cloud Computing using Access Controls
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Furthermore, this method suffers a trade-off between accuracy and privacy and most of the research work focused on key management issues and static access policies but due to user dynamic the access control ...
cipher text policy-Attribute based encryption (HCP-ABE), it derived from classic ABE. ...
Mobile cloud computing (MCC) has many security models in first the security done with either symmetric encryption or asymmetric encryption, in first scenario the owner encrypt data with secrete key after ...
doi:10.35940/ijitee.l3120.1081219
fatcat:ngakwghi6fdv5omrcxykoilyfm
Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR
2019
Computer Science and Information Systems
Considering that privacy preservation and policy updating are the key problems in PHR, a privacy-preserving multiauthority attribute-based encryption scheme with dynamic policy updating in PHR was proposed ...
Attribute-Based Encryption (ABE), as a new public key cryptosystem that guarantees fine-grained access control of outsourced encrypted data, has been used to design the PHR system. ...
In terms of security, the [8, 15] are only secure under the random oracle model. Our scheme and the schemes in [10, 11, 16, 17, 19] are secure under the standard model. ...
doi:10.2298/csis180830029y
fatcat:tajdq5k2e5advabo5vnorxjo6e
Incremental Deterministic Public-Key Encryption
[chapter]
2012
Lecture Notes in Computer Science
Our second scheme is based on the Decisional Diffie-Hellman assumption in the standard model. ...
We present a framework for modeling the incrementality of deterministic public-key encryption. ...
Modeling Incremental Deterministic Public-Key Encryption In this section we present a framework for modeling the incrementality of deterministic public-key encryption schemes. ...
doi:10.1007/978-3-642-29011-4_37
fatcat:buaypxu4tzgwdmofggltctx3iq
Secure Data Access Control with Cipher Text Update and Computation Outsourcing in Fog Computing for Internet of Things
2021
Turkish Journal of Computer and Mathematics Education
The proposed conspire is demonstrated to be secure in the standard model and can give trait repudiation and public unquestionable status. ...
In this paper, we propose the Novel cipher text-based encryption model (NCEM) which has an information access control plot dependent on Ciphertext-Policy it give information privacy, fine-grained control ...
Methodology System Model In this proposed model, the trait authority is a completely confided in party which is accountable for creating framework boundaries just as mystery key for every client. ...
doi:10.17762/turcomat.v12i2.1441
fatcat:tocwjrrwxrd2fkd5eblkzy3m3e
Incremental Deterministic Public-Key Encryption
2017
Journal of Cryptology
Our second scheme is based on the Decisional Diffie-Hellman assumption in the standard model. ...
We present a framework for modeling the incrementality of deterministic public-key encryption. ...
Modeling Incremental Deterministic Public-Key Encryption In this section we present a framework for modeling the incrementality of deterministic public-key encryption schemes. ...
doi:10.1007/s00145-017-9252-1
fatcat:cvbtrmjckbgkfcs6hi6dfvybkq
A Scalable and Secure Group Key Management Method for Secure V2V Communication
2020
Sensors
In addition, the proposed method employs a lightweight matrix-based encryption algorithm that can be easily applicable with the proposed group key management method. ...
The simulation results show that the proposed method can reduce computation time for group key generation and message encryption by more than 80% compared to existing methods. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s20216137
pmid:33126693
fatcat:movv5iwt2jetnodveirrnftxlu
« Previous
Showing results 1 — 15 out of 38,752 results