Cryptanalysis of a Pairing-based Authentication Scheme for Smart Grid Communications
Yu-Qi Lee, Tsu-Yang Wu, Xiao-Cong Liang, Tao Wang, Chien-Ming Chen, Jerry Chun-Wei Lin, Yeh-Cheng Chen
Book:
Smart Innovation, Systems and Technologies
(Advances in Smart Vehicular Technology, Transportation, Communication and Applications)
Volume 226
(2021),
p. 75
An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
Changji Wang, Yuan Li, Shengyi Jiang, Jiayuan Wu
Book:
Lecture Notes in Computer Science
(Smart Computing and Communication)
Volume 10135
(2017),
p. 506
A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Li Tseng
Journal:
International Journal of Distributed Sensor Networks
Volume 11,
Issue 5
(2015),
p. 898716
A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT
Chandrashekhar Meshram, Ahmed Alsanad, Jitendra V. Tembhurne, Shailendra W. Shende, Kailash Wamanrao Kalare, Sarita Gajbhiye Meshram, Muhammad Azeem Akbar, Abdu Gumaei
Journal:
IEEE Access
Volume 9
(2021),
p. 3649
A brief review of revocable ID-based public key cryptosystem
Tsu-Yang Wu, Jerry Chun-Wei Lin, Chien-Ming Chen, Yuh-Min Tseng, Jaroslav Frnda, Lukas Sevcik, Miroslav Voznak
Journal:
Perspectives in Science
Volume 7
(2016),
p. 81
A systematic analysis of identity based encryption (IBE)
Aravind Karrothu, Jasmine Norman
Journal:
International Journal of Knowledge-based and Intelligent Engineering Systems
Volume 25,
Issue 3
(2021),
p. 343
Efficient Anonymous Multireceiver Certificateless Encryption
Ying-Hao Hung, Sen-Shan Huang, Yuh-Min Tseng, Tung-Tso Tsai
Journal:
IEEE Systems Journal
Volume 11,
Issue 4
(2017),
p. 2602
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
Hongyong Jia, Yue Chen, Julong Lan, Kaixiang Huang, Jun Wang
Journal:
International Journal of Information Security
Volume 17,
Issue 4
(2018),
p. 477
IIBES: a proposed framework to improve the identity-based encryption system for securing federated learning
Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah, Kamal Gulati
Journal:
International Journal of Pervasive Computing and Communications
Volume 20,
Issue 5
(2024),
p. 622
Identity based secure authentication scheme based on quantum key distribution for cloud computing
Geeta Sharma, Sheetal Kalra
Journal:
Peer-to-Peer Networking and Applications
Volume 11,
Issue 2
(2018),
p. 220
Revocable Identity-Based Encryption Scheme Under LWE Assumption in the Standard Model
Yaling Zhang, Shangping Wang, Qing Du
Journal:
IEEE Access
Volume 6
(2018),
p. 65298
Revocable hierarchical identity-based encryption via history-free approach
Jae Hong Seo, Keita Emura
Journal:
Theoretical Computer Science
Volume 615
(2016),
p. 45
Secure Certificateless Signature with Revocation in the Standard Model
Tung-Tso Tsai, Sen-Shan Huang, Yuh-Min Tseng
Journal:
Mathematical Problems in Engineering
Volume 2014
(2014),
p. 1
Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation
Keita EMURA, Jae Hong SEO, Taek-Young YOUN
Journal:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Volume E99.A,
Issue 1
(2016),
p. 83
Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters
Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Muhammad Khurram Khan
Journal:
PLOS ONE
Volume 13,
Issue 4
(2018),
p. e0195204