Articles with "identity based" as a keyword



Photo by kellysikkema from unsplash

Identity-Based Quantum Designated Verifier Signature

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-019-04377-0

Abstract: Designated verifier signatures are very useful in the applications such as e-voting and auction. In this paper, an identity-based quantum designated verifier signature (IDQDVS) scheme is proposed. It has the security properties such as designated… read more here.

Keywords: designated verifier; identity based; signature; verifier signature ... See more keywords
Photo from wikipedia

ESKI-IBE: Efficient and secure key issuing identity-based encryption with cloud privacy centers

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-7155-x

Abstract: Digital certificate validation associated with traditional public key cryptosystems make it impractical in real-world environments due to their storage cost. The identity-based cryptosystems have been proven advantageous as they do not require any digital certificate… read more here.

Keywords: key; private key; identity based; secure key ... See more keywords
Photo from archive.org

A more compact multi-id identity-based FHE scheme in the standard model and its applications

Sign Up to like & get
recommendations!
Published in 2017 at "Science China Information Sciences"

DOI: 10.1007/s11432-017-9412-3

Abstract: According to the two types of identity mapping in existed IBE schemes: one type is GPV-IBE [1] and another is other lattice-based IBE schemes [2–7], there are two types of vector ciphertexts in original IBE… read more here.

Keywords: ibe schemes; multi identity; compact multi; identity based ... See more keywords
Photo by campaign_creators from unsplash

Efficient identity-based data transmission for VANET

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0650-x

Abstract: To simplify the key management processes, data transmission protocols for vehicular ad-hoc networks typically use identity-based cryptography for protecting the transmitted data. However, current identity-based data transmission protocols are mainly based on the bilinear map… read more here.

Keywords: based data; efficient; data transmission; identity based ... See more keywords
Photo from wikipedia

Process matters: Teachers benefit their classrooms and students when they deliver an identity-based motivation intervention with fidelity

Sign Up to like & get
recommendations!
Published in 2021 at "Contemporary Educational Psychology"

DOI: 10.1016/j.cedpsych.2021.101993

Abstract: Abstract Students value school success but often experience classroom norms implying that learning is easy and succeeding in school is not difficult. Applying an identity-based motivation (IBM) lens highlights three ways succeed-with-ease-not-effort norms can undermine… read more here.

Keywords: school; success; identity based; based motivation ... See more keywords
Photo by nonresident from unsplash

Building social identity-based groups to enhance online peer support for patients with chronic disease: a pilot study using mixed-methods evaluation.

Sign Up to like & get
recommendations!
Published in 2022 at "Translational behavioral medicine"

DOI: 10.1093/tbm/ibac008

Abstract: Online peer support is increasingly important to encourage patients with chronic diseases to engage in successful self-management. However, studies mainly focus on individual-level participation and have not fully explored how to maximize the impact of… read more here.

Keywords: group; peer support; support; identity based ... See more keywords
Photo from wikipedia

Formal Reporting of Identity-Based Harassment at an Academic Medical Center: Incidence, Barriers, and Institutional Responses

Sign Up to like & get
recommendations!
Published in 2022 at "Academic Medicine"

DOI: 10.1097/acm.0000000000004711

Abstract: Purpose To examine the incidence of, barriers to, and institutional responses to formal reporting of experiences of identity-based harassment at an academic medical center. Method The authors invited 4,545 faculty and medical trainees at the… read more here.

Keywords: based harassment; cisgender women; identity based; institutional responses ... See more keywords
Photo from wikipedia

PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2841008

Abstract: Due to the advantages of low handover latency and signaling costs, Proxy Mobile IPv6 (PMIPv6), as a localized mobility management protocol for next generation mobile network, can be well combined with vehicular ad-hoc networks. However,… read more here.

Keywords: scheme; authentication; based signature; identity based ... See more keywords
Photo by homajob from unsplash

Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2852784

Abstract: Cloud computing and social networks are changing the way of healthcare by providing real-time data sharing in a cost-effective manner. However, data security issue is one of the main obstacles to the wide application of… read more here.

Keywords: data sharing; cloud computing; social networks; identity based ... See more keywords

CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2873019

Abstract: Identity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important… read more here.

Keywords: identity based; cloud; encryption; ciphertext evolution ... See more keywords
Photo by lukaszlada from unsplash

Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2899680

Abstract: With the higher rate of using cloud storage, protecting data privacy becomes an important issue. The most effective solution is to encrypt data before uploading to the cloud. However, how to efficiently search over data… read more here.

Keywords: test; equality test; cloud storage; ciphertexts ... See more keywords