A survey on attribute-based encryption schemes suitable for the internet of things

M Rasori, M La Manna, P Perazzo… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is an information service paradigm based on the integration of
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …

[HTML][HTML] Private set intersection: A systematic literature review

D Morales, I Agudo, J Lopez - Computer Science Review, 2023 - Elsevier
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …

SBFT: A scalable and decentralized trust infrastructure

GG Gueta, I Abraham, S Grossman… - 2019 49th Annual …, 2019 - ieeexplore.ieee.org
SBFT is a state of the art Byzantine fault tolerant state machine replication system that
addresses the challenges of scalability, decentralization and global geo-replication. SBFT is …

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks

Q Huang, H Li - Information Sciences, 2017 - Elsevier
How to efficiently search over encrypted data is an important and interesting problem in the
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …

MIStore: a blockchain-based medical insurance storage system

L Zhou, L Wang, Y Sun - Journal of medical systems, 2018 - Springer
Currently, blockchain technology, which is decentralized and may provide tamper-resistance
to recorded data, is experiencing exponential growth in industry and research. In this paper …

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

Candidate multilinear maps from ideal lattices

S Garg, C Gentry, S Halevi - … 32nd Annual International Conference on the …, 2013 - Springer
We describe plausible lattice-based constructions with properties that approximate the
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …

[PDF][PDF] Identity-Based Encryption from the Weil Pairing

D Boneh - 2001 - dulieu.antoanthongtin.gov.vn
We propose a fully functional identity-based encryption scheme (IBE). The scheme has
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …

[BUCH][B] The arithmetic of elliptic curves

JH Silverman - 2009 - Springer
The theory of elliptic curves is distinguished by its long history and by the diversity of the
methods that have been used in its study. This book treats the arithmetic theory of elliptic …

Short randomizable signatures

D Pointcheval, O Sanders - Topics in Cryptology-CT-RSA 2016: The …, 2016 - Springer
Digital signature is a fundamental primitive with numerous applications. Following the
development of pairing-based cryptography, several taking advantage of this setting have …