Identity based key-insulated encryption with outsourced equality test

被引:0
|
作者
Alornyo, Seth [1 ]
Zhao, Yanan [1 ]
Zhu, Guobin [1 ]
Xiong, Hu [1 ]
机构
[1] School of Information and Software Engineering, University of Electronic Science and Technology of China, Sichuan-Chengdu, China
关键词
Public key cryptography;
D O I
10.6633/IJNS.20200322(2).09
中图分类号
学科分类号
摘要
引用
收藏
页码:257 / 264
相关论文
共 50 条
  • [1] Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption
    Ren, Yanli
    Wang, Shuozhong
    Zhang, Xinpeng
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 647 - 658
  • [2] Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme
    Wang, Xu An
    Weng, Jian
    Yang, Xiaoyuan
    Zhang, Minqing
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (02) : 219 - 225
  • [3] Attribute-Based Key-Insulated Encryption
    Chen, Jian-Hong
    Wang, Yong-Tao
    Chen, Ke-Fei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (02) : 437 - 449
  • [4] Identity-based hierarchical strongly key-insulated encryption and its application
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 495 - 514
  • [5] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756
  • [6] Identity-based threshold key-insulated encryption without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Zheng, Dong
    Qiu, Weidong
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 203 - +
  • [7] Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
    Watanabe, Yohei
    Shikata, Junji
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 255 - 279
  • [8] Identity-based encryption with outsourced equality test in cloud computing
    Ma, Sha
    INFORMATION SCIENCES, 2016, 328 : 389 - 402
  • [9] ID-based key-insulated signcryption with equality test in cloud computing
    Seth Alornyo
    Kingsford Kissi Mireku
    Mustapha Adamu Mohammed
    Daniel Adu-Gyamfi
    Michael Asante
    SN Applied Sciences, 2021, 3
  • [10] A strong identity based key-insulated cryptosystem
    Li, Jin
    Zhang, Fangguo
    Wang, Yanming
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 352 - 361