Zobrazeno 1 - 10
of 168
pro vyhledávání: '"key revocation"'
Publikováno v:
International Journal of Pervasive Computing and Communications, 2022, Vol. 20, Issue 5, pp. 622-632.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJPCC-02-2022-0073
Autor:
Kwangsu Lee
Publikováno v:
IEEE Access, Vol 11, Pp 52636-52652 (2023)
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating th
Externí odkaz:
https://doaj.org/article/bc953f82c5594ba4a754409eab0b9adb
Autor:
Kwangsu Lee, Joon Sik Kim
Publikováno v:
IEEE Access, Vol 10, Pp 44178-44199 (2022)
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that provides the efficient key revocation function by broadcasting an update key per each time period. Many RHIBE schemes have been proposed by combining an HIBE scheme
Externí odkaz:
https://doaj.org/article/de83dcf0fa7e4a9d8ec28fdeb5e0e428
Autor:
Maitri Patel, Rajan Patel
Publikováno v:
Emerging Science Journal, Vol 5, Iss 1, Pp 77-84 (2021)
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC). IBC will generate an
Externí odkaz:
https://doaj.org/article/56693b9d98cd4706aa4c6804a9689ccc
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Tongxin xuebao, Vol 39, Pp 94-102 (2018)
To solve the problem of massive keys storage caused by multi-source data encryption in ciphertext retrieval system,a key storage scheme based on keyed hash tree with state was proposed.The scheme computes encryption key according to the root key and
Externí odkaz:
https://doaj.org/article/a64b9bfbc7af47e89329d36876ddf998
Autor:
Elbanna, Ziyad
Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the envir
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-219684
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 2, Iss 3, Pp 1-14 (2015)
Boneh, Ding and Tsudik presented identity-based mediated RSA encryption and signature systems in which the users are not allowed to decrypt/sign messages without the authorisation of a security mediator.We show that ID-MRSA is not secure and we prese
Externí odkaz:
https://doaj.org/article/1fc92a0008044cf6ab225d3c7b499b4f
Autor:
Collins Sey, Hang Lei, Weizhong Qian, Xiaoyu Li, Linda Delali Fiasam, Seth Larweh Kodjiku, Isaac Adjei-Mensah, Isaac Osei Agyemang
Publikováno v:
Sensors; Volume 22; Issue 20; Pages: 8083
The rapid advancement of the Internet of Vehicles (IoV) has led to a massive growth in data received from IoV networks. The cloud storage has been a timely service that provides a vast range of data storage for IoV networks. However, existing data st