Academic literature on the topic 'Identity based encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity based encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Identity based encryption"
Huang, Meijuan, Bo Yang, Yi Zhao, Kaitai Liang, Liang Xue, and Xiaoyi Yang. "CCA-Secure Deterministic Identity-Based Encryption Scheme." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 245–69. https://doi.org/10.3217/jucs-025-03-0245.
Full textWu, Jian. "Identity-Based Proxy Signcryption Schemes." Applied Mechanics and Materials 380-384 (August 2013): 2605–8. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2605.
Full textHerranz, Javier. "Attribute-based encryption implies identity-based encryption." IET Information Security 11, no. 6 (2017): 332–37. http://dx.doi.org/10.1049/iet-ifs.2016.0490.
Full textREN, YANLI, DAWU GU, SHUOZHONG WANG, and XINPENGU ZHANG. "HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES." International Journal of Foundations of Computer Science 21, no. 06 (2010): 1049–63. http://dx.doi.org/10.1142/s0129054110007726.
Full textScott, M. "Faster identity based encryption." Electronics Letters 40, no. 14 (2004): 861. http://dx.doi.org/10.1049/el:20045081.
Full textAbdalla, Michel, James Birkett, Dario Catalano, et al. "Wildcarded Identity-Based Encryption." Journal of Cryptology 24, no. 1 (2010): 42–82. http://dx.doi.org/10.1007/s00145-010-9060-3.
Full textLe, Xuan Lam, Le Nhat Bui, and Viet Cuong Trinh. "An Efficient Wildcarded Identity-Based Encryption Scheme." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 16, no. 1 (2025): 543–59. https://doi.org/10.58346/jowua.2025.i1.032.
Full textTseng, Yi-Fan, Chun-I. Fan, and Chih-Wen Lin. "Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 182–202. https://doi.org/10.3217/jucs-025-03-0182.
Full textShao, Jun, and Zhenfu Cao. "Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption." Information Sciences 206 (November 2012): 83–95. http://dx.doi.org/10.1016/j.ins.2012.04.013.
Full textShiraly, Danial, Nasrollah Pakniat, and Ziba Eslami. "Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting." ISC International Journal of Information Security 15, no. 3 (2023): 1–16. https://doi.org/10.22042/isecure.2023.416676.1014.
Full textDissertations / Theses on the topic "Identity based encryption"
Hedges, Mary. "Elliptic curve cryptography and identity-based encryption." Connect to online resource, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1442908.
Full textSrinivasan, Sriramkrishnan. "New security notions for identity based encryption." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529038.
Full textDe, Caro Angelo. "On the Generalizations of Identity-Based Encryption." Doctoral thesis, Universita degli studi di Salerno, 2013. http://hdl.handle.net/10556/899.
Full textTam, Tony. "Identity-Based Encryption on resource constrained embedded system." Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1569592.
Full textOdyurt, Uraz. "Application of Fuzzy Logic in Identity-Based Cryptography." Thesis, Linnéuniversitetet, Institutionen för matematik (MA), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134.
Full textGermouty, Paul. "Identity-based cryptography." Thesis, Limoges, 2018. http://www.theses.fr/2018LIMO0041/document.
Full textKwok, Hon-man Sammy, and 郭漢文. "A scalable and secure networking paradigm using identity-based cryptography." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971713.
Full textLi, Qinyi. "Lattice public-key encryption: Richer, tighter, stronger." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/107651/1/Qinyi_Li_Thesis.pdf.
Full textIncebacak, Davut. "Design And Implementation Of A Secure And Searchable Audit Logging System." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/2/12608431/index.pdf.
Full textPrest, Thomas. "Gaussian sampling in lattice-based cryptography." Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0045/document.
Full textBooks on the topic "Identity based encryption"
Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.
Full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.
Find full textA, Szygenda Stephen, ed. Security for wireless sensor networks using identity-based cryptography. CRC Press/Taylor & Francis Group, 2013.
Find full textFischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textHelger, Lipmaa, and SpringerLink (Online service), eds. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textBook chapters on the topic "Identity based encryption"
Chatterjee, Sanjit, and Palash Sarkar. "Selective-Identity Model." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_5.
Full textChatterjee, Sanjit, and Palash Sarkar. "Introduction." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_1.
Full textChatterjee, Sanjit, and Palash Sarkar. "Applications, Extensions and Related Primitives." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_10.
Full textChatterjee, Sanjit, and Palash Sarkar. "Avoiding Key Escrow." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_11.
Full textChatterjee, Sanjit, and Palash Sarkar. "Products and Standards." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_12.
Full textChatterjee, Sanjit, and Palash Sarkar. "Bibliography." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_13.
Full textChatterjee, Sanjit, and Palash Sarkar. "Definitions and Notations." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_2.
Full textChatterjee, Sanjit, and Palash Sarkar. "A Brief Background on Elliptic Curves and Pairings." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_3.
Full textChatterjee, Sanjit, and Palash Sarkar. "Boneh-Franklin IBE and its Variants." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_4.
Full textChatterjee, Sanjit, and Palash Sarkar. "Security Against Adaptive Chosen Ciphertext Attacks." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_6.
Full textConference papers on the topic "Identity based encryption"
Qi, Zhenghua, Gang Yang, Xunyi Ren, and Qiang Zhou. "Compressible Identity-Based Fully Homomorphic Encryption." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00013.
Full textZhang, Tianqiao, Mingming Jiang, and Hui Ge. "Fuzzy Identity-Based Encryption Scheme Based on RLWE." In 2024 2nd International Conference on Computer, Vision and Intelligent Technology (ICCVIT). IEEE, 2024. https://doi.org/10.1109/iccvit63928.2024.10872574.
Full textLiang, Yuan, Giovanni Di Crescenzo, Haining Wang, and Zahir Patni. "Efficient Identity-Based Encryption with Minimal Server Trust." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00020.
Full textWang, Aqian, Baodong Qin, and Yajun Fan. "Revocable Identity-Based Searchable Encryption Scheme for Smart Grid." In 2024 6th International Conference on Natural Language Processing (ICNLP). IEEE, 2024. http://dx.doi.org/10.1109/icnlp60986.2024.10692988.
Full textSakai, Ryuichi. "Flexible identity based attribute encryption from identity based broadcast encryption." In 2008 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2008. http://dx.doi.org/10.1109/isita.2008.4895435.
Full textLu, Yang, and Jiguo Li. "Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption." In 2012 Fourth International Symposium on Information Science and Engineering (ISISE). IEEE, 2012. http://dx.doi.org/10.1109/isise.2012.50.
Full textWang, Xu an, and Xiaoyuan Yang. "Identity based broadcast encryption based on one to many identity based proxy re-encryption." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234998.
Full textDing, Yi, and Xu An Wang. "Identity Based Proxy Re-encryption Based on a Variant of BB1 Identity Based Encryption." In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, 2010. http://dx.doi.org/10.1109/nswctc.2010.270.
Full textBellare, Mihir, and Viet Tung Hoang. "Identity-Based Format-Preserving Encryption." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3133956.3133995.
Full textMyers, Steven. "Session details: Identity-based encryption." In CCS08: 15th ACM Conference on Computer and Communications Security 2008. ACM, 2008. http://dx.doi.org/10.1145/3260814.
Full textReports on the topic "Identity based encryption"
Appenzeller, G., L. Martin, and M. Schertler. Identity-Based Encryption Architecture and Supporting Data Structures. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5408.
Full textGroves, M. Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6507.
Full textNove, Charles, Andrew Fisher, Alex Mitsdarfer, and Tiffany Pierce. Securing MQTT with Identity-Based Encryption: Secure MQTT v1.0 Protocol Specification. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2462998.
Full textHengartner, Urs, and Peter Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada457869.
Full textMartin, L., and M. Schertler. Using the Boneh-Franklin and Boneh-Boyen Identity-Based Encryption Algorithms with the Cryptographic Message Syntax (CMS). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5409.
Full textSchertler, Mark J. Evaluation of Identity Based Encryption (IBE) Capabilities for the US DHS S&T Secure Wireless Communications Program and the CAN-US Security Enhanced Blackberry Trial. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada482302.
Full textSchertler, Mark J., and Prashanth Koppula. Voltage Identify Based Encryption (VIBE). Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada432563.
Full textAllende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.
Full textRannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, 2021. http://dx.doi.org/10.21248/gups.63413.
Full text