Identity based key-insulated encryption with outsourced equality test

被引:0
|
作者
Alornyo, Seth [1 ]
Zhao, Yanan [1 ]
Zhu, Guobin [1 ]
Xiong, Hu [1 ]
机构
[1] School of Information and Software Engineering, University of Electronic Science and Technology of China, Sichuan-Chengdu, China
关键词
Public key cryptography;
D O I
10.6633/IJNS.20200322(2).09
中图分类号
学科分类号
摘要
引用
收藏
页码:257 / 264
相关论文
共 50 条
  • [31] Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments
    Ma, Sha
    Zhong, Yijian
    Huang, Qiong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3758 - 3772
  • [32] Identity-based key-insulated signature with secure key-updates
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 13 - +
  • [33] Parallel key-insulated public key encryption without random oracles
    Libert, Benoit
    Quisquater, Jean-Jacques
    Yung, Moti
    PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 298 - +
  • [34] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
  • [35] Identity-based parallel key-insulated signature: Framework and construction
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2008, 40 (01): : 55 - 68
  • [36] Generic Construction of Identity-Based Strong Key-Insulated Signature
    Zhou, Dehua
    Weng, Jian
    Chen, Kefei
    Zheng, Dong
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 629 - 635
  • [37] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, ChangShe
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1253 - 1258
  • [38] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Zhu, Guobin
    Xiong, Hu
    Qin, Zhiguang
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (02) : 1401 - 1416
  • [39] Practical parallel key-insulated encryption with multiple helper keys
    Ren, Yanli
    Wang, Shuozhong
    Zhang, Xinpeng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1403 - 1412
  • [40] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    Wireless Personal Communications, 2014, 79 : 1401 - 1416