Location based encryption
We first propose a 2D Location Based Encryption (LBE) scheme, where the setting includes a geography center system and the 2D triangle area including the set of locations. A user joining in the system is provided with a pre-arranged key, which belongs to her/his location. If the user’s location is b...
Saved in:
Main Authors: | PHUONG, Tran Viet Xuan, SUSILO, Willy, YANG, Guomin, YAN, Jun, LIU, Dongxi |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2019
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7409 https://ink.library.smu.edu.sg/context/sis_research/article/8412/viewcontent/location_based.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Efficient hidden vector encryption with constant-size ciphertext
by: PHUONG, Tran Viet Xuan, et al.
Published: (2014) -
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption
by: LAI, Junzuo, et al.
Published: (2014) -
Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext
by: SUSILO, Willy, et al.
Published: (2016) -
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
by: SUSILO, Willy, et al.
Published: (2018) -
Probabilistic public key encryption with equality test
by: YANG, Guomin, et al.
Published: (2010)