An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
From MaRDI portal
(Redirected from Publication:780213)
Recommendations
- A secure cloud data sharing scheme from identity-based proxy re-encryption
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Intelligent cryptography approach for secure distributed big data storage in cloud computing
- Enforcing access controls on encrypted cloud storage with policy hiding
Cites work
- scientific article; zbMATH DE number 6966248 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A more efficient accountable authority IBE scheme under the DL assumption
- A new general framework for secure public key encryption with keyword search
- A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\)
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A strong provably secure IBE scheme without bilinear map
- Advances in Cryptology - EUROCRYPT 2004
- An ID-based cryptographic mechanisms based on GDLP and IFP
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Compact hierarchical identity-based encryption based on a Harder decisional problem
- Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem
- Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient hybrid encryption from ID-based encryption
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Hierarchical ID-Based Cryptography
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- Identity-based encryption with outsourced equality test in cloud computing
- New identity-based cryptographic scheme for IFP and DLP based cryptosystem
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
- Secure integration of asymmetric and symmetric encryption schemes
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Topics in Cryptology – CT-RSA 2004
- Two-server password-only authenticated key exchange
Cited in
(4)- Re-encryption method designed by row complete matrix
- Anonymous certificateless multi-receiver encryption scheme for smart community management systems
- An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
- Efficient subtree-based encryption for fuzzy-entity data sharing
This page was built for publication: An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q780213)