J Li, J Li, X Chen, C Jia, DS Wong - IACR Cryptology ePrint Archive, 2012, 2012 - Citeseer
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of …
One of the key features that must be supported by every modern PKI is an efficient way to determine (at verification) whether the signing key had been revoked. In most solutions, the …
J Vakarjuk - Security and Trust Management: 18th International …, 2023 - books.google.com
We propose a threshold encryption scheme with two-party decryption, where one of the keyshares may be stored and used in a device that is able to provide only weak security for …
J Li, X Chen, J Li, C Jia, J Ma… - Journal of Computer …, 2015 - content.iospress.com
As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for outsourced data security …
K Bicakci, N Baykal - Public Key Infrastructure: First European PKI …, 2004 - Springer
Just like PKI, used to support public key certificates, Privilege Management Infrastructure (PMI) is built to provide a foundation to employ attribute certificates. Although most of the PKI …
K Anguraju, RK Prakash, V Sowjanya… - … on Computer, Power …, 2022 - ieeexplore.ieee.org
The cryptography and steganography can be employed as an appropriate tool for improving the confidentiality of transmissions over the cloud environment. Several of the prevailing …
D Firsov, H Lakk, S Laur, A Truu - SECRYPT, 2021 - scitepress.org
We propose a new digital signature scheme based on combining cryptographic timestamping with an endorsement scheme, both of which can be constructed from one-way …
C Sur, KH Rhee - Asia-Pacific Network Operations and Management …, 2006 - Springer
Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal area network …