Provably secure and efficient escrowable public key encryption schemes
In an escrowable public key encryption (E-PKE) scheme, there are two keys associated with one public key. It can reduce the total number of certificates in the public key infrastructure (PKI) to a large extent, thus degrade the com-plexity of certificate management. Moreover, an E-PKE scheme can als...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | Wen-hao LIU, Sheng-bao WANG, Zhen-fu CAO, Li-dong HAN |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2014-07-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/doi:10.3969/j.issn.1000-436x.2014.07.004/ |
Similar Items
Provably secure and efficient escrowable public key encryption schemes
by: Wen-hao LIU, et al.
Published: (2014-07-01)
by: Wen-hao LIU, et al.
Published: (2014-07-01)
EPN:encryption padding for NTRU with provable security
by: MU Ning-bo, et al.
Published: (2008-01-01)
by: MU Ning-bo, et al.
Published: (2008-01-01)
EPN:encryption padding for NTRU with provable security
by: MU Ning-bo, et al.
Published: (2008-01-01)
by: MU Ning-bo, et al.
Published: (2008-01-01)
Escrow mechanism for personal security keys on IBE
by: ZOU Yue-peng1, et al.
Published: (2009-01-01)
by: ZOU Yue-peng1, et al.
Published: (2009-01-01)
Escrow mechanism for personal security keys on IBE
by: ZOU Yue-peng1, et al.
Published: (2009-01-01)
by: ZOU Yue-peng1, et al.
Published: (2009-01-01)
Key Assignment Schemes with Authenticated Encryption, revisited
by: Jeroen Pijnenburg, et al.
Published: (2020-07-01)
by: Jeroen Pijnenburg, et al.
Published: (2020-07-01)
Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free
by: Meijuan Huang, et al.
Published: (2024-01-01)
by: Meijuan Huang, et al.
Published: (2024-01-01)
Identity authentication scheme based on identity-based encryption
by: Ren-ji HUANG, et al.
Published: (2016-06-01)
by: Ren-ji HUANG, et al.
Published: (2016-06-01)
Efficient and provably secure attribute-based online/offline encryption schemes
by: Hai-ying MA, et al.
Published: (2014-07-01)
by: Hai-ying MA, et al.
Published: (2014-07-01)
Efficient and provably secure attribute-based online/offline encryption schemes
by: Hai-ying MA, et al.
Published: (2014-07-01)
by: Hai-ying MA, et al.
Published: (2014-07-01)
Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow
by: Yang Chen, et al.
Published: (2018-01-01)
by: Yang Chen, et al.
Published: (2018-01-01)
Conditions for anonymity in some generic public-key encryption constructions
by: TIAN Yuan, et al.
Published: (2009-01-01)
by: TIAN Yuan, et al.
Published: (2009-01-01)
Conditions for anonymity in some generic public-key encryption constructions
by: TIAN Yuan, et al.
Published: (2009-01-01)
by: TIAN Yuan, et al.
Published: (2009-01-01)
Forward-secure ciphertext-policy attribute-based encryption scheme
by: EIJiang-hong W, et al.
Published: (2014-07-01)
by: EIJiang-hong W, et al.
Published: (2014-07-01)
Forward-secure ciphertext-policy attribute-based encryption scheme
by: EIJiang-hong W, et al.
Published: (2014-07-01)
by: EIJiang-hong W, et al.
Published: (2014-07-01)
Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik’s Cubes
by: Ping Pan, et al.
Published: (2020-01-01)
by: Ping Pan, et al.
Published: (2020-01-01)
Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation
by: Masahiro Kamimura, et al.
Published: (2020-01-01)
by: Masahiro Kamimura, et al.
Published: (2020-01-01)
Fairly verifiable multi-user homomorphic proxy re-encryption scheme
by: HOU Jinqiu, et al.
Published: (2025-03-01)
by: HOU Jinqiu, et al.
Published: (2025-03-01)
Provably secure rational delegation computation protocol
by: Youliang TIAN, et al.
Published: (2019-07-01)
by: Youliang TIAN, et al.
Published: (2019-07-01)
Provably secure rational delegation computation protocol
by: Youliang TIAN, et al.
Published: (2019-07-01)
by: Youliang TIAN, et al.
Published: (2019-07-01)
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
by: Jinglin Zou, et al.
Published: (2023-03-01)
by: Jinglin Zou, et al.
Published: (2023-03-01)
Provably secure data selective sharing scheme with cloud-based decentralized trust management systems
by: S. Velmurugan, et al.
Published: (2024-04-01)
by: S. Velmurugan, et al.
Published: (2024-04-01)
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security
by: Jingwei Lu, et al.
Published: (2023-02-01)
by: Jingwei Lu, et al.
Published: (2023-02-01)
Evaluating Homomorphic Encryption Schemes for Privacy and Security in Healthcare Data Management
by: Henrique Jorge, et al.
Published: (2025-09-01)
by: Henrique Jorge, et al.
Published: (2025-09-01)
Provably secure private key protection scheme for smart mobile terminal
by: Jun MA, et al.
Published: (2012-12-01)
by: Jun MA, et al.
Published: (2012-12-01)
Provably secure private key protection scheme for smart mobile terminal
by: Jun MA, et al.
Published: (2012-12-01)
by: Jun MA, et al.
Published: (2012-12-01)
Provable Data Possession using Additive Homomorphic Encryption
by: Parth Shah, et al.
Published: (2022-06-01)
by: Parth Shah, et al.
Published: (2022-06-01)
Integrating Classical Preprocessing into an Optical Encryption Scheme
by: Hai Pham, et al.
Published: (2019-09-01)
by: Hai Pham, et al.
Published: (2019-09-01)
Provable secure digital watermarking scheme
Published: (2008-01-01)
Published: (2008-01-01)
Provable secure digital watermarking scheme
Published: (2008-01-01)
Published: (2008-01-01)
Provably secure secret sharing scheme based on bilinear maps
by: LI Hui-xian1, et al.
Published: (2008-01-01)
by: LI Hui-xian1, et al.
Published: (2008-01-01)
Provably secure secret sharing scheme based on bilinear maps
by: LI Hui-xian1, et al.
Published: (2008-01-01)
by: LI Hui-xian1, et al.
Published: (2008-01-01)
Escrow Contract as a New Way to Ensure Obligations
by: N. Yu. Belokopytova, et al.
Published: (2019-03-01)
by: N. Yu. Belokopytova, et al.
Published: (2019-03-01)
Provable Secure Delegation Computing Protocol Based on Privacy Protection
by: LI Qiuxian, ZHOU Quanxing, WANG Zhenlong, DING Hongfa, PAN Qixin
Published: (2021-05-01)
by: LI Qiuxian, ZHOU Quanxing, WANG Zhenlong, DING Hongfa, PAN Qixin
Published: (2021-05-01)
Public key searchable encryption scheme based on blockchain
by: Ruizhong DU, et al.
Published: (2020-04-01)
by: Ruizhong DU, et al.
Published: (2020-04-01)
Public key searchable encryption scheme based on blockchain
by: Ruizhong DU, et al.
Published: (2020-04-01)
by: Ruizhong DU, et al.
Published: (2020-04-01)
Attacking Pairing-Free Attribute-Based Encryption Schemes
by: Javier Herranz
Published: (2020-01-01)
by: Javier Herranz
Published: (2020-01-01)
A Multivariate Public Key Encryption Scheme With Equality Test
by: Xiaoying Shen, et al.
Published: (2020-01-01)
by: Xiaoying Shen, et al.
Published: (2020-01-01)
Design of multi-key encryption method
by: Yuqing ZHONG, et al.
Published: (2020-11-01)
by: Yuqing ZHONG, et al.
Published: (2020-11-01)
Design of multi-key encryption method
by: Yuqing ZHONG, et al.
Published: (2020-11-01)
by: Yuqing ZHONG, et al.
Published: (2020-11-01)
Similar Items
-
Provably secure and efficient escrowable public key encryption schemes
by: Wen-hao LIU, et al.
Published: (2014-07-01) -
EPN:encryption padding for NTRU with provable security
by: MU Ning-bo, et al.
Published: (2008-01-01) -
EPN:encryption padding for NTRU with provable security
by: MU Ning-bo, et al.
Published: (2008-01-01) -
Escrow mechanism for personal security keys on IBE
by: ZOU Yue-peng1, et al.
Published: (2009-01-01) -
Escrow mechanism for personal security keys on IBE
by: ZOU Yue-peng1, et al.
Published: (2009-01-01)
