Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJanuary 2024
Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes
Innovative Security Solutions for Information Technology and CommunicationsPages 26–34https://doi.org/10.1007/978-3-031-52947-4_3AbstractIn the design of an identity-based encryption (IBE) scheme, the primary security assumptions center around quadratic residues, bilinear mappings, and lattices. Among these approaches, one of the most intriguing is introduced by Clifford Cocks and ...
- research-articleMay 2016
Secure architectures of future emerging cryptography SAFEcrypto
- Maire O'Neill,
- Elizabeth O'Sullivan,
- Gavin McWilliams,
- Markku-Juhani Saarinen,
- Ciara Moore,
- Ayesha Khalid,
- James Howe,
- Rafael del Pino,
- Michel Abdalla,
- Francesco Regazzoni,
- Felipe Valencia,
- Tim Güneysu,
- Tobias Oder,
- Adrian Waller,
- Glyn Jones,
- Anthony Barnett,
- Robert Griffin,
- Andrew Byrne,
- Bassem Ammar,
- David Lund
CF '16: Proceedings of the ACM International Conference on Computing FrontiersPages 315–322https://doi.org/10.1145/2903150.2907756Funded under the European Union's Horizon 2020 research and innovation programme, SAFEcrypto will provide a new generation of practical, robust and physically secure post-quantum cryptographic solutions that ensure long-term security for future ICT ...
- research-articleSeptember 2015
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search
IEEE Transactions on Information Forensics and Security (TIFS), Volume 10, Issue 9Pages 1993–2006https://doi.org/10.1109/TIFS.2015.2442220Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes searchable ...
- ArticleAugust 2015
RSAE: Ranked Keyword Search over Asymmetric Encrypted Cloud Data
BDCLOUD '15: Proceedings of the 2015 IEEE Fifth International Conference on Big Data and Cloud ComputingPages 82–86https://doi.org/10.1109/BDCloud.2015.11Cloud computing becomes more and more popular and is applied into many practical applications because of much cheaper and more powerful features. In cloud system, users can outsource local data to the cloud servers to lighten their local storage and ...
- ArticleFebruary 2015
Experiments in Encrypted and Searchable Network Audit Logs
EITES '15: Proceedings of the 2015 International Conference on Emerging Information Technology and Engineering SolutionsPages 18–22https://doi.org/10.1109/EITES.2015.13We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy ...
-
- posterMarch 2012
Location proofing using identity based encryption and the Google cloud on the mobile applications
ACMSE '12: Proceedings of the 50th annual ACM Southeast ConferencePages 333–334https://doi.org/10.1145/2184512.2184591This paper describes a Location Proofing system that provides the user's location by encrypting the data using Identity Based Encryption. A location proof is a piece of data that certifies the receiver to a geographical location. Location proofs are ...
- rfcMarch 2012
RFC 6539: IBAKE: Identity-Based Authenticated Key Exchange
Cryptographic protocols based on public-key methods have been traditionally based on certificates and Public Key Infrastructure (PKI) to support certificate management. The emerging field of Identity-Based Encryption (IBE) protocols allows simplification ...
- ArticleNovember 2011
CCA secure IB-KEM from the computational bilinear diffie-hellman assumption in the standard model
ICISC'11: Proceedings of the 14th international conference on Information Security and CryptologyPages 275–301https://doi.org/10.1007/978-3-642-31912-9_19In this paper, we propose several selective-identity chosen-ciphertext attack (IND-sID-CCA) secure identity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffie-Hellman (CBDH) assumption in the ...
- tutorialSeptember 2011
Secure document engineering
DocEng '11: Proceedings of the 11th ACM symposium on Document engineeringPages 269–272https://doi.org/10.1145/2034691.2034746With the boom in interactive and composite documents and the increased coupling between the on-line and physical worlds, the need for secure document engineering is greater than ever. Four important factors contribute to the need to re-engineer document ...
- research-articleSeptember 2011
Publicly posted composite documents with identity based encryption
DocEng '11: Proceedings of the 11th ACM symposium on Document engineeringPages 239–248https://doi.org/10.1145/2034691.2034740Recently-introduced Publicly Posted Composite Documents (PPCDs) enable composite documents with different formats and differential access control to participate in cross-organizational workflows distributed over potentially non-secure channels. The ...
- ArticleJuly 2011
A new leakage-resilient IBE scheme in the relative leakage model
DBSec'11: Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacyPages 263–270We propose the first leakage-resilient Identity-Based Encryption (IBE) scheme with full domain hash structure. Our scheme is leakageresilient in the relative leakage model and the random oracle model under the decisional bilinear Diffie-Hellman (DBDH) ...
- ArticleMay 2011
A novel commutative blinding identity based encryption scheme
FPS'11: Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of SecurityPages 73–89https://doi.org/10.1007/978-3-642-27901-0_7In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes that are selective-identity secure in the standard model. Particularly, the first one known as BB1 -IBE, which is characterized by commutative blinding ...
- research-articleOctober 2010
Practical leakage-resilient identity-based encryption from simple assumptions
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityPages 152–161https://doi.org/10.1145/1866307.1866325We design the first Leakage-Resilient Identity-Based Encryption (LR-IBE) systems from static assumptions in the standard model. We derive these schemes by applying a hash proof technique from Alwen et.al. (Eurocrypt '10) to variants of the existing IBE ...
- research-articleSeptember 2010
Flexible key exchange negotiation for wireless sensor networks
WiNTECH '10: Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterizationPages 55–62https://doi.org/10.1145/1860079.1860090Despite recent improvements of the capabilities of Wireless Sensor Networks (WSN) nodes, network protocol support for key management is still lagging behind. While in traditional networks well known protocol suites (e.g., IPsec IKE and the TLS handshake)...
- ArticleJune 2010
Elliptic curves cryptosystems for ecommerce applications
Elliptic curve cryptography provides a higher performance than the classic cryptography mainly because shorter keys are used. This paper presents the basics of the elliptic curves, emphasizing the advantage of using them in ecommerce cryptography, this ...
- ArticleMarch 2010
Anonymity from asymmetry: new constructions for anonymous HIBE
CT-RSA'10: Proceedings of the 2010 international conference on Topics in CryptologyPages 148–164https://doi.org/10.1007/978-3-642-11925-5_11A Hierarchical Identity Based Encryption (HIBE) system is anonymous if the ciphertext reveals no information about the recipient's identity. create it. While there are multiple constructions for secure HIBE, far fewer constructions exist for anonymous ...
- ArticleDecember 2009
Lattice-Based CCA-Secure Cryptosystem from IBE System
CIS '09: Proceedings of the 2009 International Conference on Computational Intelligence and Security - Volume 02Pages 260–264https://doi.org/10.1109/CIS.2009.172We first introduce some basic problems in lattice-based cryptography. Then we show how multibit LWE-based cryptosystem and IBE system can be constrcuted on them. According to the method put forward by D. Boneh et. al., we construct a public key ...
- ArticleAugust 2009
HASS: Highly Available, Scalable and Secure Distributed Data Storage Systems
CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 02Pages 772–780https://doi.org/10.1109/CSE.2009.70As computers become pervasive and data size increases dramatically, data management systems' security, scalability and availability features turn into major design issues, especially in distributed computingenvironments. This paper proposes a Highly ...
- ArticleApril 2009
Message authentication for wireless sensor networks
CIS'09: Proceedings of the international conference on Computational and information science 2009Pages 386–390This article describes an authentication protocol based on pairings for a wireless sensor network considering the execution cost. The proposed protocol provides a node authentication process based on identity, as well as a message authentication process ...
- ArticleDecember 2008
Combined Public Key Cryptosystem Based on Conic Curves over the Ring Zn
CSSE '08: Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 03Pages 631–634https://doi.org/10.1109/CSSE.2008.542In this paper, we propose a Combined Public Key Cryptosystem based on Conic Curves (CPK-CCC) over the residue class ring without trusted third parties, assume the existence of trusted Key Management Center (KMC). The security of this scheme relies on ...