Login
Register
Home
Issues
Volume 21, Issue 3 (2010)
New Fuzzy Identity-Based Encryption in t ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
11
New Fuzzy Identity-Based Encryption in the Standard Model
Introduction to DNA computing
Tarun Kumar, Suyel Namasudra
https://doi.org/10.1016/bs.adcom.2022.08.001
Book:
Advances in Computers (Perspective of DNA Computing in Computer Science)
Volume 129 (2023), p. 1
2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)
Aravind Karrothu, B. Brindavathi, Chunduru Anilkumar
https://doi.org/10.1109/ICESC57686.2023.10193280
Conference:
(2023), p. 1556
Extensions of IBE and Related Primitives
Syed Taqi Ali
https://doi.org/10.1007/978-3-030-60890-3_12
Book:
EAI/Springer Innovations in Communication and Computing (Functional Encryption)
(2021), p. 205
A systematic analysis of identity based encryption (IBE)
Aravind Karrothu, Jasmine Norman
https://doi.org/10.3233/KES-210078
Journal:
International Journal of Knowledge-based and Intelligent Engineering Systems
Volume 25, Issue 3 (2021), p. 343
CCA2 secure biometric identity based encryption with constant-size ciphertext
Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun
https://doi.org/10.1631/jzus.C1000429
Journal:
Journal of Zhejiang University SCIENCE C
Volume 12, Issue 10 (2011), p. 819
Fault-tolerant identity-based encryption from SM9
Xiaohong Liu, Xinyi Huang, Zhaohui Cheng, Wei Wu
https://doi.org/10.1007/s11432-022-3706-7
Journal:
Science China Information Sciences
Volume 67, Issue 2 (2024)
Fully secure fuzzy identity-based encryption for secure IoT communications
Yijun Mao, Jin Li, Min-Rong Chen, Jianan Liu, Congge Xie, Yiju Zhan
https://doi.org/10.1016/j.csi.2015.06.007
Journal:
Computer Standards & Interfaces
Volume 44 (2016), p. 117
LMIBE: Lattice-Based Matchmaking Identity-Based Encryption for Internet of Things
Xufeng Tao, Yan Qiang, Peng Wang, Yingsen Wang
https://doi.org/10.1109/ACCESS.2023.3240304
Journal:
IEEE Access
Volume 11 (2023), p. 9851
On the realization of fuzzy identity‐based identification scheme using fingerprint biometrics
Syh‐Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh, Bok‐Min Goi, Swee‐Huay Heng
https://doi.org/10.1002/sec.408
Journal:
Security and Communication Networks
Volume 5, Issue 12 (2012), p. 1312
SECURITY ANALYSIS OF A FUZZY IDENTITY-BASED ENCRYPTION SCHEME
MIAOMIAO TIAN, LIUSHENG HUANG, WEI YANG
https://doi.org/10.1142/S0218126614500339
Journal:
Journal of Circuits, Systems and Computers
Volume 23, Issue 03 (2014), p. 1450033
Secure Certificateless Signature with Revocation in the Standard Model
Tung-Tso Tsai, Sen-Shan Huang, Yuh-Min Tseng
https://doi.org/10.1155/2014/728591
Journal:
Mathematical Problems in Engineering
Volume 2014 (2014), p. 1
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top