Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model

Full metadata record
DC Field Value Language
dc.contributor.authorHwang, Seong Oun-
dc.contributor.authorLe, Minh-Ha-
dc.date.available2020-07-10T04:40:31Z-
dc.date.created2020-07-06-
dc.date.issued2018-
dc.identifier.issn1064-1246-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/4748-
dc.description.abstractTelco systems usually run large-scale, centralized key management systems. However, centralized approaches based on conventional public key encryption like RSA raise problems such as key escrow, secure channel to delivery key, and third-party query as well as single point of failure. To address these problems, we propose both certificate-based encryption (CBE) and hierarchical certificate-based encryption (HCBE) schemes proved secure in the standard model. Compared with other schemes, our schemes are proved IND-CCA2 (Indistinguishability under Adaptive Chosen Ciphertext Attack) secure in full model, where the number of group elements is independent of the value of security parameter. As far as we know, the proposed HCBE is the first fully IND-CCA2 secure scheme with ciphetexts of constant size.-
dc.language영어-
dc.language.isoen-
dc.publisherIOS PRESS-
dc.subjectIDENTITY-BASED ENCRYPTION-
dc.subjectGENERIC CONSTRUCTION-
dc.titleEfficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model-
dc.typeArticle-
dc.contributor.affiliatedAuthorHwang, Seong Oun-
dc.identifier.doi10.3233/JIFS-169838-
dc.identifier.scopusid2-s2.0-85059441886-
dc.identifier.wosid000459214900017-
dc.identifier.bibliographicCitationJOURNAL OF INTELLIGENT & FUZZY SYSTEMS, v.35, no.6, pp.5971 - 5981-
dc.relation.isPartOfJOURNAL OF INTELLIGENT & FUZZY SYSTEMS-
dc.citation.titleJOURNAL OF INTELLIGENT & FUZZY SYSTEMS-
dc.citation.volume35-
dc.citation.number6-
dc.citation.startPage5971-
dc.citation.endPage5981-
dc.type.rimsART-
dc.type.docTypeArticle; Proceedings Paper-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusGENERIC CONSTRUCTION-
dc.subject.keywordAuthorCertificate-based encryption-
dc.subject.keywordAuthorhierarchical certificate-based encryption-
dc.subject.keywordAuthoridentity-based encryption-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE