咨询与建议

限定检索结果

文献类型

  • 28 篇 期刊文献
  • 23 篇 会议

馆藏范围

  • 51 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 46 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 11 篇 软件工程
    • 7 篇 信息与通信工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 12 篇 理学
    • 11 篇 数学
    • 1 篇 化学
    • 1 篇 生物学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 51 篇 hierarchical ide...
  • 5 篇 standard model
  • 5 篇 identity-based e...
  • 5 篇 bilinear maps
  • 5 篇 dual system encr...
  • 4 篇 key revocation
  • 4 篇 anonymity
  • 3 篇 lattices
  • 3 篇 tight security
  • 3 篇 cryptanalysis
  • 2 篇 bilinear pairing
  • 2 篇 learning with er...
  • 2 篇 full security
  • 2 篇 h-cdh assumption
  • 2 篇 cdh assumption
  • 2 篇 identity-based h...
  • 2 篇 unbounded hierar...
  • 2 篇 key escrow
  • 2 篇 asymmetric pairi...
  • 2 篇 security

机构

  • 3 篇 natl univ def te...
  • 2 篇 chinese acad sci...
  • 2 篇 renmin univ chin...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ chinese aca...
  • 2 篇 shanghai jiao to...
  • 2 篇 xidian univ sch ...
  • 2 篇 univ wollongong ...
  • 2 篇 ntnu norwegian u...
  • 2 篇 xian univ posts ...
  • 2 篇 karlsruhe inst t...
  • 1 篇 beihang univ sch...
  • 1 篇 fudan univ sch c...
  • 1 篇 china natl digit...
  • 1 篇 qingdao univ col...
  • 1 篇 kanazawa univ in...
  • 1 篇 ewha womans univ...
  • 1 篇 sci & technol co...
  • 1 篇 natl inst adv in...
  • 1 篇 south china agr ...

作者

  • 4 篇 wu qing
  • 3 篇 watanabe yohei
  • 3 篇 chen peixin
  • 3 篇 langrehr roman
  • 3 篇 luo song
  • 3 篇 pan jiaxin
  • 3 篇 wang xiaofeng
  • 3 篇 lee dong hoon
  • 3 篇 lee kwangsu
  • 3 篇 park jong hwan
  • 2 篇 chen zhong
  • 2 篇 liu weiran
  • 2 篇 zhang leyou
  • 2 篇 sun suxia
  • 2 篇 su jinshu
  • 2 篇 qin bo
  • 2 篇 wu qianhong
  • 2 篇 mu yi
  • 2 篇 susilo willy
  • 2 篇 emura keita

语言

  • 50 篇 英文
  • 1 篇 其他
检索条件"主题词=hierarchical identity-based encryption"
51 条 记 录,以下是1-10 订阅
排序:
hierarchical identity-based encryption without key delegation in decryption
收藏 引用
INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING 2014年 第2期5卷 71-79页
作者: Luo, Song Chen, Zhong Chongqing Univ Technol Coll Comp Sci & Engn Chongqing 400054 Peoples R China Peking Univ Sch Elect Engn & Comp Sci Inst Software Beijing 100871 Peoples R China Peking Univ Minist Educ Key Lab High Confidence Software Technol Beijing 100871 Peoples R China
hierarchical identity-based encryption (HIBE) is a generalisation of identity- based encryption (IBE) which mirrors an organisational hierarchy. However, when the user decrypts a ciphertext encrypted to a hierarchical... 详细信息
来源: 评论
hierarchical identity-based encryption with Tight Multi-challenge Security  23rd
Hierarchical Identity-Based Encryption with Tight Multi-chal...
收藏 引用
23rd International Conference on the Practice and Theory of Public-Key Cryptography (PKC)
作者: Langrehr, Roman Pan, Jiaxin Swiss Fed Inst Technol Zurich Switzerland NTNU Norwegian Univ Sci & Technol Dept Math Sci Trondheim Norway
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive security in the multi-challenge setting, where adversaries are allowed to ask for ciphertexts for multiple adaptively cho... 详细信息
来源: 评论
Compact Anonymous hierarchical identity-based encryption with Constant Size Private Keys
收藏 引用
COMPUTER JOURNAL 2016年 第4期59卷 452-461页
作者: Zhang, Leyou Mu, Yi Wu, Qing Xidian Univ Sch Math & Stat Xian 710071 Shaanxi Peoples R China Univ Wollongong Sch Comp Sci & Software Engn Wollongong NSW 2522 Australia Xian Univ Posts & Telecommun Sch Automat Xian 710121 Shaanxi Peoples R China
We present a new construction of anonymous hierarchical identity-based encryption (HIBE) over prime order groups. The distinct feature of our proposed scheme is that both private key and ciphertext have a constant siz... 详细信息
来源: 评论
Tightly Secure hierarchical identity-based encryption
收藏 引用
JOURNAL OF CRYPTOLOGY 2020年 第4期33卷 1787-1821页
作者: Langrehr, Roman Pan, Jiaxin Swiss Fed Inst Technol Zurich Switzerland NTNU Norwegian Univ Sci & Technol Dept Math Sci Trondheim Norway Karlsruhe Inst Technol KIT Karlsruhe Germany
We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our const... 详细信息
来源: 评论
Efficient and Fully CCA Secure Conditional Proxy Re-encryption from hierarchical identity-based encryption
收藏 引用
COMPUTER JOURNAL 2015年 第10期58卷 2778-2792页
作者: Liang, Kaitai Susilo, Willy Liu, Joseph K. Wong, Duncan S. Aalto Univ Dept Comp Sci Espoo Finland Univ Wollongong Sch Comp & Informat Technol Ctr Comp & Informat Secur Res Wollongong NSW 2522 Australia Monash Univ Fac Informat Technol Melbourne Vic 3004 Australia ASTRI Secur & Data Sci Hong Kong Hong Kong Peoples R China
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted data stored on the cloud without revealing the data to an honest-but-curious cloud service provider (i.e. the PRE pro... 详细信息
来源: 评论
Revocable hierarchical identity-based encryption with adaptive security
收藏 引用
THEORETICAL COMPUTER SCIENCE 2021年 880卷 37-68页
作者: Lee, Kwangsu Sejong Univ Seoul South Korea
hierarchical identity-based encryption (HIBE) can be extended to revocable HIBE (RHIBE) if a private key of a user can be revoked when the private key is revealed or expired. Previously, many selectively secure RHIBE ... 详细信息
来源: 评论
Analysis of Hu-Huang-Fan Practical hierarchical identity-based encryption Scheme
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2010年 第6期E93A卷 1269-1273页
作者: Park, Jong Hwan Lee, Dong Hoon Kyung Hee Univ Dept Appl Math Seoul South Korea Korea Univ Grad Sch Informat Management & Secur Seoul South Korea
Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's ... 详细信息
来源: 评论
Efficient hierarchical identity-based encryption for Mobile Ad hoc Networks
收藏 引用
MOBILE INFORMATION SYSTEMS 2014年 第4期10卷 407-425页
作者: He, Kai Chen, Min-Rong Mao, Yijun Zhang, Xi Zhang, Yiju Jinan Univ Dept Comp Sci Guangzhou 510632 Guangdong Peoples R China Shenzhen Univ Coll Informat Engn Shenzhen Guangdong Peoples R China S China Normal Univ Sch Comp Guangzhou Guangdong Peoples R China Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou 510275 Guangdong Peoples R China South China Agr Univ Coll Informat Guangzhou Guangdong Peoples R China Shenzhen Univ Coll Comp Sci & Software Engn Shenzhen Guangdong Peoples R China Sun Yat Sen Univ Sch Engn Guangzhou 510275 Guangdong Peoples R China
A Mobile Ad-hoc Network (MANET) is a collection of wireless nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure. Such networks are more vulnera... 详细信息
来源: 评论
Compact hierarchical identity-based encryption based on a harder decisional problem
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 2015年 第3期92卷 463-472页
作者: Galindo, David Loria UMR 7503 CNRS F-54506 Vandoeuvre Les Nancy France
We generalize the decisional problem that was used to prove the security of a well-known hierarchical identity-based encryption scheme by Boneh, Boyen and Goh. We argue that our new problem is strictly harder than the... 详细信息
来源: 评论
A Generic Approach to Build Revocable hierarchical identity-based encryption
收藏 引用
IEEE ACCESS 2022年 10卷 44178-44199页
作者: Lee, Kwangsu Kim, Joon Sik Sejong Univ Dept Comp & Informat Secur Seoul South Korea Korea Univ Grad Sch Informat Secur Seoul 02841 South Korea
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that provides the efficient key revocation function by broadcasting an update key per each time period. Many RHIBE schemes have been pro... 详细信息
来源: 评论