Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure
暂无分享,去创建一个
[1] Xiaoming Hu,et al. Constant Size Ciphertext and Private Key HIBE without Random Oracles , 2014, J. Inf. Sci. Eng..
[2] Laurence T. Yang,et al. Cyberentity Security in the Internet of Things , 2013, Computer.
[3] Tomás Cerný,et al. Survey of Authentication and Authorization for the Internet of Things , 2018, Secur. Commun. Networks.
[4] Elaine Shi,et al. Delegating Capabilities in Predicate Encryption Systems , 2008, ICALP.
[5] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[6] Laurence T. Yang,et al. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things , 2015, IEEE Transactions on Parallel and Distributed Systems.
[7] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[8] Jun Wang,et al. Efficient revocable hierarchical identity-based encryption using cryptographic accumulators , 2017, International Journal of Information Security.
[9] Elijah Blessing Rajsingh,et al. Analysis of hierarchical identity based encryption schemes and its applicability to computing environments , 2017, J. Inf. Secur. Appl..
[10] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[11] Dong Hoon Lee,et al. Anonymous HIBE with short ciphertexts: full security in prime order groups , 2013, Designs, Codes and Cryptography.
[12] Weisong Shi,et al. On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..
[13] Keita Emura,et al. Revocable hierarchical identity-based encryption , 2014, Theor. Comput. Sci..
[14] Sanjit Chatterjee,et al. Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks , 2007, ProvSec.
[15] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[16] Yuan Li,et al. An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme , 2016, SmartCom.
[17] Sanjit Chatterjee,et al. HIBE With Short Public Parameters Without Random Oracle , 2006, ASIACRYPT.
[18] Hoeteck Wee,et al. Dual System Groups and its Applications - Compact HIBE and More , 2014, IACR Cryptol. ePrint Arch..
[19] Kwangsu Lee,et al. Revocable hierarchical identity-based encryption with shorter private keys and update keys , 2018, Designs, Codes and Cryptography.
[20] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[21] Dong Hoon Lee,et al. Revocable Hierarchical Identity-Based Encryption from Multilinear Maps , 2016, ArXiv.
[22] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[23] Yuan Zhang,et al. SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption , 2017, ICICS.
[24] A. Lewko,et al. Fully Secure HIBE with Short Ciphertexts , 2009 .
[25] Angelo De Caro,et al. Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts , 2010, Pairing.
[26] Dan Boneh,et al. Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.
[27] Fei Wang,et al. A hierarchical identity based key management scheme in tactical Mobile Ad Hoc Networks , 2009 .
[28] Xiaofeng Wang,et al. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters , 2018, PloS one.
[29] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[30] Yong Tang,et al. Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[31] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[32] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[33] Yi Mu,et al. Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys , 2016, Comput. J..
[34] Dong Hoon Lee,et al. Anonymous HIBE: Compact Construction Over Prime-Order Groups , 2013, IEEE Trans. Inf. Theory.