A survey on attribute-based encryption schemes suitable for the internet of things
The Internet of Things (IoT) is an information service paradigm based on the integration of
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …
[HTML][HTML] Private set intersection: A systematic literature review
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …
parties to compute a function on their private inputs, obtaining the output at the end and …
SBFT: A scalable and decentralized trust infrastructure
GG Gueta, I Abraham, S Grossman… - 2019 49th Annual …, 2019 - ieeexplore.ieee.org
SBFT is a state of the art Byzantine fault tolerant state machine replication system that
addresses the challenges of scalability, decentralization and global geo-replication. SBFT is …
addresses the challenges of scalability, decentralization and global geo-replication. SBFT is …
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
How to efficiently search over encrypted data is an important and interesting problem in the
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …
MIStore: a blockchain-based medical insurance storage system
L Zhou, L Wang, Y Sun - Journal of medical systems, 2018 - Springer
Currently, blockchain technology, which is decentralized and may provide tamper-resistance
to recorded data, is experiencing exponential growth in industry and research. In this paper …
to recorded data, is experiencing exponential growth in industry and research. In this paper …
A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …
network communication technology to establish ubiquitous connectivity among people …
Candidate multilinear maps from ideal lattices
We describe plausible lattice-based constructions with properties that approximate the
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …
[PDF][PDF] Identity-Based Encryption from the Weil Pairing
D Boneh - 2001 - dulieu.antoanthongtin.gov.vn
We propose a fully functional identity-based encryption scheme (IBE). The scheme has
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …
[BUCH][B] The arithmetic of elliptic curves
JH Silverman - 2009 - Springer
The theory of elliptic curves is distinguished by its long history and by the diversity of the
methods that have been used in its study. This book treats the arithmetic theory of elliptic …
methods that have been used in its study. This book treats the arithmetic theory of elliptic …
Short randomizable signatures
Digital signature is a fundamental primitive with numerous applications. Following the
development of pairing-based cryptography, several taking advantage of this setting have …
development of pairing-based cryptography, several taking advantage of this setting have …