Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting

Danial Shiraly; Nasrollah Pakniat; Ziba Eslami

Volume 15, Issue 3 , October 2023, , Pages 1-17

https://doi.org/10.22042/isecure.2023.416676.1014

Abstract
  Public key encryption with keyword search (PEKS) is a cryptographic primitive designed for performing secure search operations over encrypted data stored on untrusted cloud servers. However, in some applications of cloud computing, there is a hierarchical access-privilege setup among users so that upper-level ...  Read More

Secure Outsourcing of Two Standard Identity-Based Cryptosystems

Hamid Mala; Mohammad Reza Saeidi

Volume 15, Issue 2 , July 2023, , Pages 216-229

https://doi.org/10.22042/isecure.2023.320345.734

Abstract
  In the last two decades bilinear pairings have found many applications in cryptography. Meanwhile identity-based cryptosystems based on bilinear pairings have received particular attention. The IEEE, IETF, and ISO organizations have been working on standardization of pairing-based cryptographic schemes. ...  Read More