Journal articles on the topic 'IBE (Identity Based Encryption)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IBE (Identity Based Encryption).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Le, Xuan Lam, Le Nhat Bui, and Viet Cuong Trinh. "An Efficient Wildcarded Identity-Based Encryption Scheme." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 16, no. 1 (2025): 543–59. https://doi.org/10.58346/jowua.2025.i1.032.
Full textTseng, Yi-Fan, Chun-I. Fan, and Chih-Wen Lin. "Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 182–202. https://doi.org/10.3217/jucs-025-03-0182.
Full textKim, Jongkil. "Backward Compatible Identity-Based Encryption." Sensors 23, no. 9 (2023): 4181. http://dx.doi.org/10.3390/s23094181.
Full textMary, Theresia, Octara Pribadi, and Leony Hoki. "Application of Bounded Collusion for Identity-Based Encryption Using the Identity Based Encryption Algorithm." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 3 (2025): 2184–88. https://doi.org/10.59934/jaiea.v4i3.1129.
Full textLiu, Peng Tao. "Secure Symmetric Key Fuzzy Identity-Based Encryption." Applied Mechanics and Materials 321-324 (June 2013): 2665–68. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2665.
Full textLuo, Song, and Ning Hu. "On the Anonymity of Identity-Based Encryption." Journal of Applied Mathematics 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/217480.
Full textKarrothu, Aravind, and Jasmine Norman. "A systematic analysis of identity based encryption (IBE)." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 3 (2021): 343–56. http://dx.doi.org/10.3233/kes-210078.
Full textZuo, Binger, Jiguo Li, Yichen Zhang, and Jian Shen. "Identity-Based Online/Offline Encryption Scheme from LWE." Information 15, no. 9 (2024): 539. http://dx.doi.org/10.3390/info15090539.
Full textShermina, Latha R, and Sreenithi R. "IDENTITY-BASED ENCRYPTION: A SECURE METHOD FOR DATA PROTECTION." International Journal of Engineering Research and Sustainable Technologies (IJERST) 2, no. 3 (2024): 16–22. https://doi.org/10.63458/ijerst.v2i3.88.
Full textAndal, S., Tasneem Tahera, M. MeghanaMary, G. C. Ranjitha, and N.A Deepak. "IMPLEMENTING CLOUD REVOCATION AUTHORITY WITH IDENTITY BASED ENCRYPTION AND ITS APPLICATIONS." International Journal of Research - Granthaalayah 5, (4) RACSIT (2017): 38–40. https://doi.org/10.5281/zenodo.572292.
Full textS., Andal, Tahera Tasneem, Meghana Mary, Ranjitha G. C., and Deepak N.A. "IMPLEMENTING CLOUD REVOCATION AUTHORITY WITH IDENTITY BASED ENCRYPTION AND ITS APPLICATIONS." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (2017): 38–40. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3348.
Full textReddy, P. Raja Sekhar, and K. Ravindranath. "CR-IBE based data sharing and revocation in the cloud." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 453–64. http://dx.doi.org/10.47974/jdmsc-1901.
Full textWang, Hongbing, Peng Zeng, and Kim-Kwang Raymond Choo. "MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption." Security and Communication Networks 7, no. 11 (2013): 1641–51. http://dx.doi.org/10.1002/sec.861.
Full textWu, Qing. "Fuzzy Techniques in Biometric IBE without Random Oracles." Applied Mechanics and Materials 148-149 (December 2011): 112–15. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.112.
Full textWang, Yang, Mingqiang Wang, Jingdan Zou, Jin Xu, and Jing Wang. "Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields." Wireless Communications and Mobile Computing 2019 (October 17, 2019): 1–13. http://dx.doi.org/10.1155/2019/1742386.
Full textClear, Michael, and Hitesh Tewari. "Anonymous Homomorphic IBE with Application to Anonymous Aggregation." Cryptography 7, no. 2 (2023): 22. http://dx.doi.org/10.3390/cryptography7020022.
Full textHu, Ziyuan, Shengli Liu, Kefei Chen, and Joseph Liu. "Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption." Cryptography 2, no. 4 (2018): 33. http://dx.doi.org/10.3390/cryptography2040033.
Full textBalasubramanian, Kannan, and M. Rajakani. "Implementation of Algorithms for Identity Based Encryption and Decryption." International Journal of Cyber Research and Education 1, no. 1 (2019): 52–62. http://dx.doi.org/10.4018/ijcre.2019010106.
Full textZhou, Yanwei, Bo Yang, Hongxia Hou, Lina Zhang, Tao Wang, and Mingxiao Hu. "Continuous Leakage-Resilient Identity-Based Encryption with Tight Security." Computer Journal 62, no. 8 (2019): 1092–105. http://dx.doi.org/10.1093/comjnl/bxy144.
Full textYin, Shao Ping. "Research on the Application of IBE in IEC61850 Substation Automation System." Applied Mechanics and Materials 130-134 (October 2011): 2805–8. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.2805.
Full textMr., Antony Jose, Fathima Lubna Ms., Jashini Siraju Ms., P. V. Rahana, Saliya Manaf A. P. Ms., and Shabna K. A. Ms. "SACT: AN ANONYMOUS COMMUNICATION TECHNIQUE." International Journal of Advances in Engineering & Scientific Research 3, no. 4 (2016): 43–56. https://doi.org/10.5281/zenodo.10774085.
Full textAdams, Carlisle. "Improving User Privacy in Identity-Based Encryption Environments." Cryptography 6, no. 4 (2022): 55. http://dx.doi.org/10.3390/cryptography6040055.
Full textKumar, Sunil, Gaurav Mittal, and Arvind Yadav. "An efficient ID-based cryptographic encryption based on group ring." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 6 (2024): 1851–66. http://dx.doi.org/10.47974/jdmsc-1871.
Full textZhang, Ya Kun, Jia Yin Tian, Cheng Yang, Yi Chun Zhang, and Fang Tian Hou. "A Novel IBE Based Authentication Scheme for Network Storage." Advanced Materials Research 452-453 (January 2012): 791–95. http://dx.doi.org/10.4028/www.scientific.net/amr.452-453.791.
Full textWang, Lu. "A Method for Key Updating of IBE with Wildcards." Advanced Materials Research 765-767 (September 2013): 1003–6. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1003.
Full textZhandry, Mark. "Secure identity-based encryption in the quantum random oracle model." International Journal of Quantum Information 13, no. 04 (2015): 1550014. http://dx.doi.org/10.1142/s0219749915500148.
Full textGarg, Deepak, Shalli Rani, Norbert Herencsar, Sahil Verma, Marcin Wozniak, and Muhammad Fazal Ijaz. "Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries." Sensors 22, no. 12 (2022): 4630. http://dx.doi.org/10.3390/s22124630.
Full textWang, Qihua, Fagen Li, and Huaqun Wang. "An Anonymous Multireceiver with Online/Offline Identity-Based Encryption." Wireless Communications and Mobile Computing 2018 (August 12, 2018): 1–10. http://dx.doi.org/10.1155/2018/5702068.
Full textLiu, Shiqi, Yan Shao, Hanbo Luo, and Hong Di. "IBE-Signal: Reshaping Signal into a MITM-Attack-Resistant Protocol." Security and Communication Networks 2022 (July 21, 2022): 1–24. http://dx.doi.org/10.1155/2022/8653453.
Full textZhao, Meng, and Yong Ding. "Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds." Security and Communication Networks 2022 (October 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/4905763.
Full textAlmuflih, Ali Saeed, Khushi Popat, Viral V. Kapdia, Mohamed Rafik Noor Mohamed Qureshi, Naif Almakayeel, and Rabia Emhamed Al Mamlook. "Efficient Key Exchange Using Identity-Based Encryption in Multipath TCP Environment." Applied Sciences 12, no. 15 (2022): 7575. http://dx.doi.org/10.3390/app12157575.
Full textLian, Yuchen, and Ruwei Huang. "KDM Security IBE Based on LWE beyond Affine Functions." Applied Sciences 13, no. 14 (2023): 8259. http://dx.doi.org/10.3390/app13148259.
Full textGuo, Sheng Chang, Yi Liu, and Jie Ling. "A Quasi IBE Identity Authentication Scheme in a Cloud Computing Environment." Advanced Materials Research 756-759 (September 2013): 837–40. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.837.
Full textRen, Chengdong, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, and Yuanjian Zhou. "CLAP-PRE: Certificateless Autonomous Path Proxy Re-Encryption for Data Sharing in the Cloud." Applied Sciences 12, no. 9 (2022): 4353. http://dx.doi.org/10.3390/app12094353.
Full textRen, Chengdong, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, and Yuanjian Zhou. "CLAP-PRE: Certificateless Autonomous Path Proxy Re-Encryption for Data Sharing in the Cloud." Applied Sciences 12, no. 9 (2022): 4353. http://dx.doi.org/10.3390/app12094353.
Full textTIAN, MIAOMIAO, LIUSHENG HUANG, and WEI YANG. "SECURITY ANALYSIS OF A FUZZY IDENTITY-BASED ENCRYPTION SCHEME." Journal of Circuits, Systems and Computers 23, no. 03 (2014): 1450033. http://dx.doi.org/10.1142/s0218126614500339.
Full textGupta, Rajeev Kumar, Khalid K. Almuzaini, R. K. Pateriya, Kaushal Shah, Piyush Kumar Shukla, and Reynah Akwafo. "An Improved Secure Key Generation Using Enhanced Identity-Based Encryption for Cloud Computing in Large-Scale 5G." Wireless Communications and Mobile Computing 2022 (March 10, 2022): 1–14. http://dx.doi.org/10.1155/2022/7291250.
Full textGao, Wenhua, Li Yang, Daode Zhang, and Xia Liu. "Quantum Identity-Based Encryption from the Learning with Errors Problem." Cryptography 6, no. 1 (2022): 9. http://dx.doi.org/10.3390/cryptography6010009.
Full textYussoff, Yusnani Mohd, and Habibah Hashim. "Analysis of Trusted Identity Based Encryption (IBE-Trust) Protocol for Wireless Sensor Networks." International Journal of Wireless and Microwave Technologies 1, no. 6 (2011): 52–58. http://dx.doi.org/10.5815/ijwmt.2011.06.08.
Full textDong, Siyue, Zhen Zhao, Baocang Wang, Wen Gao, and Shanshan Zhang. "SM9 Identity-Based Encryption with Designated-Position Fuzzy Equality Test." Electronics 13, no. 7 (2024): 1256. http://dx.doi.org/10.3390/electronics13071256.
Full textAnupama, T. A., and M. A. Megha. "Keyword Search mechanism Using Multiple Authorities on Encrypted Cloud Data." Journal of Network Security and Data Mining 6, no. 3 (2023): 17–23. https://doi.org/10.5281/zenodo.8195033.
Full textFan, Huifeng, Ruwei Huang, and Fengting Luo. "Efficient Multi-Identity Full Homomorphic Encryption Scheme on Lattice." Applied Sciences 13, no. 10 (2023): 6343. http://dx.doi.org/10.3390/app13106343.
Full textMa, Xuecheng, and Dongdai Lin. "Server-aided Revocable IBE with Identity Reuse." Computer Journal 63, no. 4 (2019): 620–32. http://dx.doi.org/10.1093/comjnl/bxz114.
Full textWang, Ziwei, Ruwei Huang, and Xiyi Wei. "A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts." Applied Sciences 15, no. 1 (2025): 473. https://doi.org/10.3390/app15010473.
Full textAlzahrani, Bander, and Shehzad Ashraf Chaudhry. "An Identity-Based Encryption Method for SDN-Enabled Source Routing Systems." Security and Communication Networks 2022 (April 13, 2022): 1–7. http://dx.doi.org/10.1155/2022/1942097.
Full textBenasser Algehawi, Mohammed, and Azman Samsudin. "A new Identity Based Encryption (IBE) scheme using extended Chebyshev polynomial over finite fields." Physics Letters A 374, no. 46 (2010): 4670–74. http://dx.doi.org/10.1016/j.physleta.2010.09.041.
Full textKumar, Mahender, and Satish Chand. "ESKI-IBE: Efficient and secure key issuing identity-based encryption with cloud privacy centers." Multimedia Tools and Applications 78, no. 14 (2019): 19753–86. http://dx.doi.org/10.1007/s11042-019-7155-x.
Full textBai, Qing Hai, Ying Zheng, and Lin Na Zhao. "The Application of IBE Encryption Scheme in Grid Environments." Applied Mechanics and Materials 551 (May 2014): 686–90. http://dx.doi.org/10.4028/www.scientific.net/amm.551.686.
Full textZhang, Bo, Tao Zhang, Zesheng Xi, Ping Chen, Jin Wei, and Yu Liu. "Secure Device-to-Device Communication in IoT: Fuzzy Identity from Wireless Channel State Information for Identity-Based Encryption." Electronics 13, no. 5 (2024): 984. http://dx.doi.org/10.3390/electronics13050984.
Full textLiu, Yan Bing, and Wen Jing Ren. "Attribute-Based Authentication Protocol of the Internet of Things." Advanced Materials Research 765-767 (September 2013): 1726–29. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1726.
Full text