An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
From MaRDI portal
Publication:780213
DOI10.1007/s00500-019-03855-1zbMath1436.94083OpenAlexW2916886902WikidataQ123198718 ScholiaQ123198718MaRDI QIDQ780213
Sarita Gajbhiye Meshram, Chandrashekhar Meshram, Muhammad Khurram Khan, Cheng-Chi Lee
Publication date: 15 July 2020
Published in: Soft Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00500-019-03855-1
cloud storagebilinear pairingsidentity-based encryptionrandom oraclesubtreegrid securitypay TV system
Related Items (2)
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem ⋮ Anonymous certificateless multi-receiver encryption scheme for smart community management systems
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- Two-server password-only authenticated key exchange
- A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\)
- An ID-based cryptographic mechanisms based on GDLP and IFP
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- A strong provably secure IBE scheme without bilinear map
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Identity-based encryption with outsourced equality test in cloud computing
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- Efficient hybrid encryption from ID-based encryption
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- Identity-Based Cryptosystems and Signature Schemes
- Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
- A New General Framework for Secure Public Key Encryption with Keyword Search
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Hierarchical ID-Based Cryptography
- Identity-Based Encryption from the Weil Pairing
- Secure integration of asymmetric and symmetric encryption schemes
- A more efficient accountable authority IBE scheme under the DL assumption
- Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem
- Compact hierarchical identity-based encryption based on a harder decisional problem
- Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment