2015
DOI: 10.1007/978-3-319-16486-1_94
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Distributed-Hierarchical Identity Based Cryptographic Scheme for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…In the sequel, in order to strengthen security guarantees and prevent attacks against this central entity, the root PKG functions w.r.t. the derivation of private keys may be distributed among several entities, based on secure multi-party computation mechanisms or threshold techniques (Yu et al, 2010;Prabhakaran and Sahai, 2013;Grumȃzescu et al, 2015). Note that, in practice, entities should agree on the hierarchical ID-based encryption and signature schemes which will be used for ciphering and signing messages, respectively.…”
Section: Security Assumptionsmentioning
confidence: 99%
“…In the sequel, in order to strengthen security guarantees and prevent attacks against this central entity, the root PKG functions w.r.t. the derivation of private keys may be distributed among several entities, based on secure multi-party computation mechanisms or threshold techniques (Yu et al, 2010;Prabhakaran and Sahai, 2013;Grumȃzescu et al, 2015). Note that, in practice, entities should agree on the hierarchical ID-based encryption and signature schemes which will be used for ciphering and signing messages, respectively.…”
Section: Security Assumptionsmentioning
confidence: 99%
“…A detailed review of literature has been done related to our studies, there has been many techniques proposed and developed for authorization and validation , but there are very few for cloud computing authorization and confirmation of users in cloud Banyal et al [3]. developed a multifactor frame work by using three [12] introduced various leveled association in mix of appropriated PKGs Kalyani and Sridevi [13].developed a framework convention of circulated key giving convention was known Accountable Identity-Based Encryption. Goyal et al, in [14] proposed The possibility of Accountable Identity-Based Encryption (An IBE).two plans were introduced: one white-box An IBE plan and one fragile blackbox An IBE plot.…”
Section: Review Of Literaturementioning
confidence: 99%