Journal articles on the topic 'Identity based encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Identity based encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Huang, Meijuan, Bo Yang, Yi Zhao, Kaitai Liang, Liang Xue, and Xiaoyi Yang. "CCA-Secure Deterministic Identity-Based Encryption Scheme." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 245–69. https://doi.org/10.3217/jucs-025-03-0245.
Full textWu, Jian. "Identity-Based Proxy Signcryption Schemes." Applied Mechanics and Materials 380-384 (August 2013): 2605–8. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2605.
Full textHerranz, Javier. "Attribute-based encryption implies identity-based encryption." IET Information Security 11, no. 6 (2017): 332–37. http://dx.doi.org/10.1049/iet-ifs.2016.0490.
Full textREN, YANLI, DAWU GU, SHUOZHONG WANG, and XINPENGU ZHANG. "HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES." International Journal of Foundations of Computer Science 21, no. 06 (2010): 1049–63. http://dx.doi.org/10.1142/s0129054110007726.
Full textScott, M. "Faster identity based encryption." Electronics Letters 40, no. 14 (2004): 861. http://dx.doi.org/10.1049/el:20045081.
Full textAbdalla, Michel, James Birkett, Dario Catalano, et al. "Wildcarded Identity-Based Encryption." Journal of Cryptology 24, no. 1 (2010): 42–82. http://dx.doi.org/10.1007/s00145-010-9060-3.
Full textLe, Xuan Lam, Le Nhat Bui, and Viet Cuong Trinh. "An Efficient Wildcarded Identity-Based Encryption Scheme." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 16, no. 1 (2025): 543–59. https://doi.org/10.58346/jowua.2025.i1.032.
Full textTseng, Yi-Fan, Chun-I. Fan, and Chih-Wen Lin. "Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 182–202. https://doi.org/10.3217/jucs-025-03-0182.
Full textShao, Jun, and Zhenfu Cao. "Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption." Information Sciences 206 (November 2012): 83–95. http://dx.doi.org/10.1016/j.ins.2012.04.013.
Full textShiraly, Danial, Nasrollah Pakniat, and Ziba Eslami. "Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting." ISC International Journal of Information Security 15, no. 3 (2023): 1–16. https://doi.org/10.22042/isecure.2023.416676.1014.
Full textShen, Shiyu, Hongbing Wang, and Yunlei Zhao. "Identity-based authenticated encryption with identity confidentiality." Theoretical Computer Science 901 (January 2022): 1–18. http://dx.doi.org/10.1016/j.tcs.2021.11.014.
Full textChun-I Fan, Ling-Ying Huang, and Pei-Hsiu Ho. "Anonymous Multireceiver Identity-Based Encryption." IEEE Transactions on Computers 59, no. 9 (2010): 1239–49. http://dx.doi.org/10.1109/tc.2010.23.
Full textSeo, Jae Hong, and Keita Emura. "Revocable hierarchical identity-based encryption." Theoretical Computer Science 542 (July 2014): 44–62. http://dx.doi.org/10.1016/j.tcs.2014.04.031.
Full textMartin, Luther. "Identity-Based Encryption and Beyond." IEEE Security & Privacy Magazine 6, no. 5 (2008): 62–64. http://dx.doi.org/10.1109/msp.2008.120.
Full textNISHIMAKI, R., Y. MANABE, and T. OKAMOTO. "Universally Composable Identity-Based Encryption." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A, no. 1 (2008): 262–71. http://dx.doi.org/10.1093/ietfec/e91-a.1.262.
Full textSarier, Neyire Deniz. "Multimodal biometric Identity Based Encryption." Future Generation Computer Systems 80 (March 2018): 112–25. http://dx.doi.org/10.1016/j.future.2017.09.078.
Full textLi, Xiaoguo, Tao Xiang, Fei Chen, and Shangwei Guo. "Efficient biometric identity-based encryption." Information Sciences 465 (October 2018): 248–64. http://dx.doi.org/10.1016/j.ins.2018.07.028.
Full textKim, Jongkil. "Backward Compatible Identity-Based Encryption." Sensors 23, no. 9 (2023): 4181. http://dx.doi.org/10.3390/s23094181.
Full textQihong Yu, Qihong Yu, Jian Shen Qihong Yu, Jin-Feng Lai Jian Shen, and Sai Ji Jin-Feng Lai. "Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption." 網際網路技術學刊 23, no. 6 (2022): 1287–96. http://dx.doi.org/10.53106/160792642022112306011.
Full textZhou, Hao, and Haochang Bi. "Wireless Sensor Network Security Based on Improved Identity Encryption." Scientific Programming 2022 (April 1, 2022): 1–10. http://dx.doi.org/10.1155/2022/2308825.
Full textKalyani, D., and R. Sridevi. "Survey on Identity based and Hierarchical Identity based Encryption Schemes." International Journal of Computer Applications 134, no. 14 (2016): 32–37. http://dx.doi.org/10.5120/ijca2016908158.
Full textZuo, Binger, Jiguo Li, Yichen Zhang, and Jian Shen. "Identity-Based Online/Offline Encryption Scheme from LWE." Information 15, no. 9 (2024): 539. http://dx.doi.org/10.3390/info15090539.
Full textPham, Minh Thuy Truc, Ngoc Ai Van Nguyen, Mei Jiang, Dung Hoang Duong, and Willy Susilo. "Wildcarded identity-based encryption from lattices." Theoretical Computer Science 902 (January 2022): 41–53. http://dx.doi.org/10.1016/j.tcs.2021.12.007.
Full textZHANG, Xin-fang. "Identity based broadcast encryption without pairings." Journal of Computer Applications 28, no. 2 (2008): 432–33. http://dx.doi.org/10.3724/sp.j.1087.2008.00432.
Full textYANG, Bin, Xuan-dong XIONG, and Ke-jun SU. "Research of mediated identity-based encryption." Journal of Computer Applications 28, no. 11 (2009): 2835–36. http://dx.doi.org/10.3724/sp.j.1087.2008.02835.
Full textNaccache, D. "Secure and practical identity-based encryption." IET Information Security 1, no. 2 (2007): 59. http://dx.doi.org/10.1049/iet-ifs:20055097.
Full textMartin, Luther. "Identity-Based Encryption Comes of Age." Computer 41, no. 8 (2008): 93–95. http://dx.doi.org/10.1109/mc.2008.299.
Full textYu, Jia, Rong Hao, Huawei Zhao, Minglei Shu, and Jianxi Fan. "IRIBE: Intrusion-resilient identity-based encryption." Information Sciences 329 (February 2016): 90–104. http://dx.doi.org/10.1016/j.ins.2015.09.020.
Full textSrinivasan, Sriramkrishnan. "Identity based encryption: Progress and challenges." Information Security Technical Report 15, no. 1 (2010): 33–40. http://dx.doi.org/10.1016/j.istr.2010.10.001.
Full textLi, Dawei, Jianwei Liu, Zongyang Zhang, Qianhong Wu, and Weiran Liu. "Revocable hierarchical identity-based broadcast encryption." Tsinghua Science and Technology 23, no. 5 (2018): 539–49. http://dx.doi.org/10.26599/tst.2018.9010023.
Full textBatamuliza, Jennifer, and Damien Hanyurwimfura. "Identity based encryption with equality test." Information Security Journal: A Global Perspective 30, no. 2 (2020): 111–24. http://dx.doi.org/10.1080/19393555.2020.1811924.
Full textLi, Sujuan, and Futai Zhang. "Leakage-resilient identity-based encryption scheme." International Journal of Grid and Utility Computing 4, no. 2/3 (2013): 187. http://dx.doi.org/10.1504/ijguc.2013.056255.
Full textLangrehr, Roman, and Jiaxin Pan. "Tightly Secure Hierarchical Identity-Based Encryption." Journal of Cryptology 33, no. 4 (2020): 1787–821. http://dx.doi.org/10.1007/s00145-020-09356-x.
Full textHur, Junbeom, Chanil Park, and Seong Oun Hwang. "Privacy-preserving identity-based broadcast encryption." Information Fusion 13, no. 4 (2012): 296–303. http://dx.doi.org/10.1016/j.inffus.2011.03.003.
Full textDöttling, Nico, and Sanjam Garg. "Identity-based Encryption from the Diffie-Hellman Assumption." Journal of the ACM 68, no. 3 (2021): 1–46. http://dx.doi.org/10.1145/3422370.
Full textCao, ChunHua, YaNa Tang, DeYan Huang, WeiMin Gan, and Chunjiong Zhang. "IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security." Security and Communication Networks 2021 (September 18, 2021): 1–8. http://dx.doi.org/10.1155/2021/8527068.
Full textZhuang, Er-Shuo, and Chun-I. Fan. "Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices." Mathematics 11, no. 18 (2023): 3830. http://dx.doi.org/10.3390/math11183830.
Full textLin, Lin, Runzong Shangguan, Hongjuan Ge, Yinchuan Liu, Yuefei Zhou, and Yanbo Zhou. "Mutual Identity Authentication Based on Dynamic Identity and Hybrid Encryption for UAV–GCS Communications." Drones 9, no. 6 (2025): 422. https://doi.org/10.3390/drones9060422.
Full textLiu, Peng Tao. "Secure Symmetric Key Fuzzy Identity-Based Encryption." Applied Mechanics and Materials 321-324 (June 2013): 2665–68. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2665.
Full textLee, Jiwon, Seunghwa Lee, Jihye Kim, and Hyunok Oh. "Scalable Wildcarded Identity-Based Encryption with Full Security." Electronics 9, no. 9 (2020): 1453. http://dx.doi.org/10.3390/electronics9091453.
Full textWang, Qihua, Fagen Li, and Huaqun Wang. "An Anonymous Multireceiver with Online/Offline Identity-Based Encryption." Wireless Communications and Mobile Computing 2018 (August 12, 2018): 1–10. http://dx.doi.org/10.1155/2018/5702068.
Full textKihara, Maki, and Satoshi Iriyama. "New Authentication Algorithm Based on Verifiable Encryption with Digital Identity." Cryptography 3, no. 3 (2019): 19. http://dx.doi.org/10.3390/cryptography3030019.
Full textLu, Rongxing, Zhenfu Cao, and Xiaolei Dong. "A New Practical Limited Identity-Based Encryption Scheme." Fundamenta Informaticae 80, no. 4 (2007): 461–74. https://doi.org/10.3233/fun-2007-80407.
Full textLiu, Liang, and Jun Ye. "Identity-based re-encryption scheme with lightweight re-encryption key generation." Journal of Discrete Mathematical Sciences and Cryptography 21, no. 1 (2018): 41–57. http://dx.doi.org/10.1080/09720529.2016.1160513.
Full textCai, Mei. "An Efficient Identity-Based Homomorphic Broadcast Encryption." Journal of Computer and Communications 07, no. 02 (2019): 23–30. http://dx.doi.org/10.4236/jcc.2019.72002.
Full textS Afre, Ashwini. "DeyPoS: Using Revocable Storage Identity-Based Encryption." International Journal for Research in Applied Science and Engineering Technology V, no. III (2017): 384–87. http://dx.doi.org/10.22214/ijraset.2017.3070.
Full textParuchuri, Vijaya Lakshmi, Ha-neul Kim, and Yang Shanshan. "Advanced Identity-Based Encryption in Cloud Computing." International Journal of Reliable Information and Assurance 2, no. 1 (2016): 33–40. http://dx.doi.org/10.21742/ijria.2014.2.1.04.
Full textSong, Ge, Yuqiao Deng, Qiong Huang, Changgen Peng, Chunming Tang, and Xiaohua Wang. "Hierarchical identity-based inner product functional encryption." Information Sciences 573 (September 2021): 332–44. http://dx.doi.org/10.1016/j.ins.2021.05.062.
Full textSEO, Jae Hong, and Keita EMURA. "Revocable Identity-Based Encryption with Rejoin Functionality." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97.A, no. 8 (2014): 1806–9. http://dx.doi.org/10.1587/transfun.e97.a.1806.
Full textZhou, Zhibin, and Dijiang Huang. "Gradual identity exposure using attribute-based encryption." International Journal of Information Privacy, Security and Integrity 1, no. 2/3 (2012): 278. http://dx.doi.org/10.1504/ijipsi.2012.046136.
Full text