An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
DOI10.1007/S00500-019-03855-1zbMATH Open1436.94083OpenAlexW2916886902WikidataQ123198718 ScholiaQ123198718MaRDI QIDQ780213FDOQ780213
Authors: Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Muhammad Khurram Khan
Publication date: 15 July 2020
Published in: Soft Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00500-019-03855-1
Recommendations
- A secure cloud data sharing scheme from identity-based proxy re-encryption
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Intelligent cryptography approach for secure distributed big data storage in cloud computing
- Enforcing access controls on encrypted cloud storage with policy hiding
bilinear pairingscloud storageidentity-based encryptionrandom oraclesubtreegrid securitypay TV system
Cites Work
- Identity-based cryptosystems and signature schemes
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Hierarchical ID-Based Cryptography
- Identity-Based Encryption from the Weil Pairing
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- A strong provably secure IBE scheme without bilinear map
- Two-server password-only authenticated key exchange
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- An ID-based cryptographic mechanisms based on GDLP and IFP
- A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\)
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- Topics in Cryptology – CT-RSA 2004
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Compact hierarchical identity-based encryption based on a Harder decisional problem
- A more efficient accountable authority IBE scheme under the DL assumption
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Identity-based encryption with outsourced equality test in cloud computing
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- Efficient hybrid encryption from ID-based encryption
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
- A new general framework for secure public key encryption with keyword search
- Title not available (Why is that?)
- New identity-based cryptographic scheme for IFP and DLP based cryptosystem
- Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem
- Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
Cited In (4)
- An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
- Anonymous certificateless multi-receiver encryption scheme for smart community management systems
- Re-encryption method designed by row complete matrix
- Efficient subtree-based encryption for fuzzy-entity data sharing
This page was built for publication: An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q780213)