2017
DOI: 10.1016/j.jisa.2017.07.005
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of hierarchical identity based encryption schemes and its applicability to computing environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 61 publications
0
5
0
Order By: Relevance
“…We specifically chose the Key-Policy Hierarchical Attribute-Based (KP-HABE) variant, since its characteristics align well with the demands of our envisioned system.In particular, our system stores EHRs in hierarchical structures and demands to control access levels according to users' privilege scope. HABE is a generalization of the Hierarchical Identity-based Encryption (HIBE) scheme [22,57] and can be classified into two categories of Key-Policy HABE (KP-HABE) [26] and Ciphertext-Policy HABE (CP-HABE) [25].…”
Section: Key-policy Hierarchical Attribute-based Encryptionmentioning
confidence: 99%
“…We specifically chose the Key-Policy Hierarchical Attribute-Based (KP-HABE) variant, since its characteristics align well with the demands of our envisioned system.In particular, our system stores EHRs in hierarchical structures and demands to control access levels according to users' privilege scope. HABE is a generalization of the Hierarchical Identity-based Encryption (HIBE) scheme [22,57] and can be classified into two categories of Key-Policy HABE (KP-HABE) [26] and Ciphertext-Policy HABE (CP-HABE) [25].…”
Section: Key-policy Hierarchical Attribute-based Encryptionmentioning
confidence: 99%
“…These schemes are based on different security assumptions such as DBDH, DBDHE, DLIN, and LWE. For a deeper analysis of HIBE schemes, we refer the reader to [74].…”
Section: Ibe and Abementioning
confidence: 99%
“…In practical applications of cloud computing service, hierarchical management mode is usually used for such applications, such as hierarchical identity-based encryption (HIBE), hierarchical attribute-based encryption (HABE, Fig. 13) and hierarchical attribute-set-based encryption (HASBE) and so on [72].…”
Section: G Hierarchical Encryptionmentioning
confidence: 99%
“…HIBE improves the scalability of IBE by sharing the workload of root private key generator (PKG) among several lower-level pkg, thus facilitating the private key delegation. Because of its structure, HIBE can be deployed in cloud computing, pervasive computing systems, wireless sensor networks to provide access control [72]. At present, almost all existing HIBE schemes have a disadvantage that ciphertext size or private key size must depend on the hierarchical depth of identity.…”
Section: ) Hierarchical Identity-based Encryption (Hibe)mentioning
confidence: 99%