k-Resilient Identity-Based Encryption in the Standard Model
We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. The scheme is provably secure in the standard model assuming the adversary can corrupt up to a maximum of k users adaptiv...
| Main Author: | HENG, S.-H. |
|---|---|
| Format: | Article |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2013/ |
Similar Items
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
An efficient and provable secure identity-based identification scheme in the standard model
by: Ji-Jian, Chin, et al.
Published: (2008)
by: Ji-Jian, Chin, et al.
Published: (2008)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
A proposal for telemedicine reference model for future standardization
by: Komiya, , R
Published: (2005)
by: Komiya, , R
Published: (2005)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Single core hardware module to implement encryption in TECB mode
by: Reaz, M. B. I., et al.
Published: (2007)
by: Reaz, M. B. I., et al.
Published: (2007)
Natural Sounding Standard Malay Speech Synthesis Based On UTMK EBMT Architecture System
by: Tiun, Sabrina
Published: (2011)
by: Tiun, Sabrina
Published: (2011)
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
Autonomous and deterministic probabilistic neural network using global k-means
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
On the optimal alpha-k curve of the sample myriad
by: Lim, Heng Siong, et al.
Published: (2007)
by: Lim, Heng Siong, et al.
Published: (2007)
Intelligent learning environment: Building hybrid system from standard application and web application
by: Chee, , KS, et al.
Published: (2005)
by: Chee, , KS, et al.
Published: (2005)
Theoretic evidence k-nearest neighbourhood classifiers in a bimodal biometric verification system
by: Jin, , ATB, et al.
Published: (2003)
by: Jin, , ATB, et al.
Published: (2003)
An Improved K-Nearest Neighbors Approach Using Modified Term Weighting And Similarity Coefficient For Text Classification
by: Kadhim, Ammar Ismael
Published: (2016)
by: Kadhim, Ammar Ismael
Published: (2016)
New constructions of universal hash functions based on function sums
by: Khoo, , K, et al.
Published: (2006)
by: Khoo, , K, et al.
Published: (2006)
Rewind: Cbt-Based Serious Game To Improve Cognitive Emotion Regulations And Anxiety Disorders
by: Heng, Yew Ken
Published: (2023)
by: Heng, Yew Ken
Published: (2023)
Accepting Multipurpose “Smart” Identity Cards in a Developing Country
by: Heng, Paul Ping Yeow, et al.
Published: (2007)
by: Heng, Paul Ping Yeow, et al.
Published: (2007)
Adoption of interorganizational system standards in supply chains - An empirical analysis of RosettaNet standards
by: Alain Chong Yee, Loong, et al.
Published: (2008)
by: Alain Chong Yee, Loong, et al.
Published: (2008)
A Social Based Model For Genetic Algorithms.
by: AL-Madi, Nagham Azmi, et al.
Published: (2007)
by: AL-Madi, Nagham Azmi, et al.
Published: (2007)
Fuzzy modeling based recognition of multi-font numerals
by: Hanmandlu, Madasu, et al.
Published: (2003)
by: Hanmandlu, Madasu, et al.
Published: (2003)
A Human Community-Based Genetic
Algorithm Model
(HCBGA)
by: Al-Madi, Nagham Azmi Qasim
Published: (2009)
by: Al-Madi, Nagham Azmi Qasim
Published: (2009)
Enhanced Micro Genetic
Algorithm-Based Models For
Multi-Objective Optimization
by: Tan, Choo Jun
Published: (2014)
by: Tan, Choo Jun
Published: (2014)
Ontology-Based Source Code Retrieval Model To Support Program Comprehension
by: Kadar, Rozita
Published: (2019)
by: Kadar, Rozita
Published: (2019)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Behavioural Factors Based Crowd
Evacuation Modelling Using
Fuzzy-Neural Approach
by: Zakaria, Wahida
Published: (2020)
by: Zakaria, Wahida
Published: (2020)
Error-resilient transmission of resolution-scalable image and video over wireless channels
by: Al Muhit, Abdullah, et al.
Published: (2006)
by: Al Muhit, Abdullah, et al.
Published: (2006)
User acceptance of ATM and transit applications embedded in Malaysia's national identity smartcard
by: Yeow, Paul H. P., et al.
Published: (2007)
by: Yeow, Paul H. P., et al.
Published: (2007)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Adaptive Pca-Based Models To
Reconstruct 3d Faces From Single 2d
Images
by: Maghari, Ashraf Y. A.
Published: (2014)
by: Maghari, Ashraf Y. A.
Published: (2014)
The Impact Of Gender And Gender
Composition On Occupational
Wage Inequality In Palestine: A
Multilevel Modeling Approach
by: Ayyash, Mohsen H.H.
Published: (2021)
by: Ayyash, Mohsen H.H.
Published: (2021)
Communication Efficient Decentralized Collaborative Learning Of Heterogeneous Deep Learning Models Using Distillation And Incentive-Based Techniques
by: Iqbal, Zahid
Published: (2023)
by: Iqbal, Zahid
Published: (2023)
Pixel-Based Parallel-Coordinates Technique For Outlier Detection In Cardiac Patient Dataset.
by: Hasimah, H.M., et al.
Published: (2007)
by: Hasimah, H.M., et al.
Published: (2007)
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)
by: Kurosawa, Kaoru, et al.
Published: (2005)
A Framework For Automatic Code Switching Speech Recognition With Multilingual Acoustic And Pronunciation Models Adaptation
by: Ahmed, Basem H. A.
Published: (2014)
by: Ahmed, Basem H. A.
Published: (2014)
Similar Items
-
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010) -
An efficient and provable secure identity-based identification scheme in the standard model
by: Ji-Jian, Chin, et al.
Published: (2008) -
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020) -
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010) -
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)