Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
In this paper, we first propose the hierarchical IKE scheme without random oracles. Our hierarchical IKE scheme is secure under the symmetric external Diffie– ...
Jan 2, 2016 · In this paper, we first propose the hierarchical IKE scheme without random oracles. Our hierarchical IKE scheme is secure under the symmetric ...
Abstract. Key-insulated encryption is one of the effective solutions to a key exposure problem. Recently, identity-based encryption (IBE) has.
Key-insulated encryption is one of the effective solutions to a key exposure problem. Recently, identity-based encryption (IBE) has been used as one of ...
This paper first proposes the hierarchical Ike scheme without random oracles, which is the first IKE scheme that achieves constant-size parameters including ...
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). In practice, key revocation is a necessary and ...
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles · List of references · Publications that cite this publication.
In this paper, we propose a new identity-based parallel key-insulated encryption (IBPKIE) scheme which achieves IND-ID-KI-CCA2 security without random oracles.
To deal with the key-exposure problem in IBE settings, we further propose an identity-based threshold key-insulated encryption (IBTKIE) scheme. The proposed ...
In this paper we apply the key-insulation mechanism to minimize the damage of key-exposure in IBS schemes. We propose a concrete key-insulated ID-based ...