• No results found

[PDF] Top 20 Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree

Has 10000 "Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree" found on our website. Below are the top 20 most common "Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree".

Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree

Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree

... Identity-Based Broadcast Encryption has some ...of Dynamic Identity-Based Broadcast Encryption was introduced by Jiang ... See full document

5

Improved Identity based Anonymous Broadcast Encryption with Chosen Ciphertext Security

Improved Identity based Anonymous Broadcast Encryption with Chosen Ciphertext Security

... as network communication, pay satellite television and data management have been battling to make their users anonymous and independent on each ...other. Broadcast encryption (BE) as an idea was ... See full document

8

Security Enhancement on Cloud Using Advanced Identity Based Encryption (Aibe)

Security Enhancement on Cloud Using Advanced Identity Based Encryption (Aibe)

... data encryption before outsourcing is a promising ...different encryption skills to solve some data privacy problems in PHRs systems and mobile social networks as well as much other work ...data ... See full document

5

Authority Cloud Data Manage and Social Security Using Identity-Based Encryption

Authority Cloud Data Manage and Social Security Using Identity-Based Encryption

... Attribute-Based Encryption [ABE] projected by Yu ...Attribute-Based Encryption. By using our security encrypted data can be kept confidential even if the storage server is ... See full document

5

Security and DependableEquivalent Service Using Fuzzy Identity-Based Encryption

Security and DependableEquivalent Service Using Fuzzy Identity-Based Encryption

... Attribute Based Encryption [8], cipher texts are associated with sets of functional attributes, and keys of user containing with detailed ...key based on the intelligence for the process of key ... See full document

11

An  Attribute-Based  Anonymous  Broadcast  Encryption  Scheme  with  Adaptive  Security  in  the  Standard  Model

An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model

... Attribute-Based Encryption (CP-ABE) scheme in which the intended subset of users, S, is specified with the access policy, T ...KeyGen, Encryption and ... See full document

17

Identity-Set-based  Broadcast  Encryption  supporting Cut-or-Select  with  Short  Ciphertext

Identity-Set-based Broadcast Encryption supporting Cut-or-Select with Short Ciphertext

... of broadcast encryption do not replace each other when n is large, so they can be thought as two complementary ...of broadcast encryption into a secure BE system [2, 7, 8] from ...sometimes ... See full document

12

Identity Based Encryption and Identity Based Signature Scheme: A Research on Security Schemes

Identity Based Encryption and Identity Based Signature Scheme: A Research on Security Schemes

... Till now, there is not any java implementation of IBE exist in public domain. According to Naor’s observation, a secure (public key) signature can be obtain through conversion of any IBE system [38] under same assumption ... See full document

8

Contingent Identity Based Broadcast Proxy Re Encryption and Its Application to Cloud Email

Contingent Identity Based Broadcast Proxy Re Encryption and Its Application to Cloud Email

... Susilo Identity-based encryption (IBE) removes the requirement of carrying a costly certificate verification ...revocable identity-based proxy re-encryption (CR-IB-PRE) scheme ... See full document

5

Data Preserving and Sharing in a Multi Owner
Environment While Preserving Identity Privacy

Data Preserving and Sharing in a Multi Owner Environment While Preserving Identity Privacy

... by using filegroups, distinguish file read and write access, handle user revocation efficiently, and allow an untrusted server to authorize file ...strong security with overhead comparable to systems that ... See full document

5

Volume 3, Issue 4, April 2014 Page 340

Volume 3, Issue 4, April 2014 Page 340

... the security from unauthorized access, integrity means correctness of the file/data after outsourcing to the proxy server, as well should not be modified by unauthorized user or even though by the proxy ... See full document

6

An Efficient Protocol for Securing Multiple Patient's Privacy in Wireless Body Sensor Network using ECIES

An Efficient Protocol for Securing Multiple Patient's Privacy in Wireless Body Sensor Network using ECIES

... (identity based encryption) that used in symmetric or asymmetric based ...key using the strings “Monday” and “doctor” to encrypt her data without further contact with the trusted ... See full document

8

Cascaded Encryption Scheme (CES) for Robust Content Security Over Internet Networks

Cascaded Encryption Scheme (CES) for Robust Content Security Over Internet Networks

... The architecture is based on a separate distribution chain for encrypted content on the one hand, and for usage rules and the decryption key on the other. Encrypted content together with a small amount of metadata ... See full document

6

Pattern Based Homomorphic Encryption Technique for Minimizing Computation and Communication Overhead

Pattern Based Homomorphic Encryption Technique for Minimizing Computation and Communication Overhead

... works against identity type of attacks. This model takes linear constant time at encryption and decryption process. Present model minimizes the Communication overhead and storage overhead during the ... See full document

8

Efficient Double Encryption in Cloud Computing

Efficient Double Encryption in Cloud Computing

... In addition, a large number of trapdoors must be generated by users and submitted to the cloud in order to perform a keyword search over many files. The implied need for secure communication, storage, and computational ... See full document

10

A  Framework  for  Identity-Based  Encryption  with   Almost  Tight  Security

A Framework for Identity-Based Encryption with Almost Tight Security

... tight security reduction in the multi-instance and multi- challenge setting yield almost tightly CCA secure PKE in the same setting via simple modification of Canetti- Halevi-Katz (CHK) transformation ... See full document

70

Implementation of Identity Based Encryption for Data Security in Cloud Environment

Implementation of Identity Based Encryption for Data Security in Cloud Environment

... benefits. Based on top of mRSA, IB-mRSA mixes the elements of character based and intervened cryptography moreover offers some useful ...offers security commensurate to that of RSA, gave that a SEM ... See full document

18

On  the  security  of  Jhanwar-Barua  Identity-Based  Encryption  Scheme

On the security of Jhanwar-Barua Identity-Based Encryption Scheme

... In [3], Jhanwar and Barua presented an improvement of the Boneh- Gentry-Hamburg (BGH) scheme. In addition to reducing the time complexity of the algorithm to find a solution of the equation ax 2 + Sy 2 ≡ 1 mod n, their ... See full document

11

Tree  Based  Symmetric  Key  Broadcast  Encryption

Tree Based Symmetric Key Broadcast Encryption

... Broadcast Encryption (BE) deals with the problem of broadcasting encrypted ...be broadcast is encrypted with a random session key using a symmetric key encryption ...encrypted ... See full document

37

Tree based symmetric key broadcast encryption

Tree based symmetric key broadcast encryption

... influential broadcast encryption (BE) scheme till date was introduced in 2001 by Naor, Naor and Lotspiech (NNL) and is based on binary ...schemes based on k-ary trees for any k ≥ ...k-ary ... See full document

40

Show all 10000 documents...