Public-key cryptography | Identity-based cryptography

Identity-based conditional proxy re-encryption

Identity-based conditional proxy re-encryption (IBCPRE) is a type of proxy re-encryption (PRE) scheme in the identity-based public key cryptographic setting. An IBCPRE scheme is a natural extension of proxy re-encryption on two aspects. The first aspect is to extend the proxy re-encryption notion to the identity-based public key cryptographic setting. The second aspect is to extend the feature set of proxy re-encryption to support conditional proxy re-encryption. By conditional proxy re-encryption, a proxy can use an IBCPRE scheme to re-encrypt a ciphertext but the ciphertext would only be well-formed for decryption if a condition applied onto the ciphertext together with the re-encryption key is satisfied. This allows fine-grained proxy re-encryption and can be useful for applications such as secure sharing over encrypted cloud data storage. (Wikipedia).

Video thumbnail

Random Oracle - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Voter Identity Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Password Reuse - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Voter Identity - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

SIPing Your Network 2/6

Speakers: Radu State, Humberto Abdelnur, and Olivier Festo clip 2/6

From playlist ShmooCon 2008

Video thumbnail

TraversalConf 2019: Your Data is Showing by Madison Kerndt

TraversalConf 2019: Your Data is Showing by Madison Kerndt

From playlist TraversalConf 2019

Video thumbnail

CERIAS Security: Minimizing Trust Liabilities in Secure Group Messaging Infrastructures 2/5

Clip 2/5 Speaker: Himanshu Khurana ยท University of Illinois at Urbana-Champaign Large-scale collaborative applications are characterized by a large number of users and other processing end entities that are distributed over geographically disparate locations. Therefore, these applicat

From playlist The CERIAS Security Seminars 2005 (1)

Video thumbnail

Token Authentication for Java Applications

In this presentation, Les will demystify HTTP Authentication and explain how the Next Big Thing - Token Authentication - can be used to secure web applications on the JVM, REST APIs, and 'unsafe' clients while supporting security best practices and even improving your application's perform

From playlist Software Development Lectures

Video thumbnail

User Authentication Protocols: Part 2

Fundamental concepts of remote user authentication are discussed. Kerberos are Analyzed. Federated identity management are presented.

From playlist Network Security

Video thumbnail

Practical API Security || Ahmed Elharouny

API security has emerged as a key priority for protecting vital data and services. It's also an area where many companies lack expertise. PUBLICATION PERMISSIONS: API Days Conference Organizer provided Coding Tech with the permission to republish API Days tech talks. CREDITS: API Days Y

From playlist APIs

Video thumbnail

SSH Authentication - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

22C3: VoIPhreaking

Speaker: Hendrik Scholz Introduction to SIP Hacking Within the last year VoIP devices and applications flooded the market. SIP (Session Initiation Protocol) became the industry standard although it's still under constant development. VoIP networks converge with the PSTN and thus offer wa

From playlist 22C3: Private Investigations

Video thumbnail

Cyber Security Full Course 2023 | Cyber Security Course Training For Beginners 2023 | Simplilearn

๐Ÿ”ฅAdvanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=CyberSecurityFullCourse2023-hXSFdwIOfnE&utm_medium=Descriptionff&utm_source=youtube ๐Ÿ”ฅCaltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.

From playlist Cyber Security Playlist [2023 Updated]๐Ÿ”ฅ

Video thumbnail

Cyber Security Live - 1 | Cyber Security Tutorial For Beginners | Cyber Security Training | Edureka

๐Ÿ”ฅCyber Security Training: https://www.edureka.co/cybersecurity-certification-training This Edureka video on Cyber Security gives an introduction to the Cyber Security world and talks about its basic concepts. You get to know different kinds of attacks in today's IT world and how cybersecur

From playlist Edureka Live Classes 2020

Video thumbnail

Communications and Network Security | CISSP Training Videos

๐Ÿ”ฅ Enroll for FREE CISSP Course & Get your Completion Certificate: https://www.simplilearn.com/learn-cloud-security-basics-skillup?utm_campaign=CCSP&utm_medium=DescriptionFirstFold&utm_source=youtube Communication and Network Security : Domain 4 of the CISSP certification course offered by

From playlist Cyber Security Playlist [2023 Updated]๐Ÿ”ฅ

Video thumbnail

Cyber Security Full course - 11 Hours | Cyber Security Training For Beginners | Edureka

๐Ÿ”ฅ๐„๐๐ฎ๐ซ๐ž๐ค๐š ๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐  (๐”๐ฌ๐ž ๐‚๐จ๐๐ž: ๐˜๐Ž๐”๐“๐”๐๐„๐Ÿ๐ŸŽ) : https://www.edureka.co/cybersecurity-certification-training This Edureka video on "Cyber Security Full Course" will help you understand and learn the fundamentals of Cyber Security. This Cyber Security Tutorial is ideal for both be

From playlist Cyber Security Training for Beginners | Edureka

Video thumbnail

Secure Shell Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Training | Edureka

๐Ÿ”ตEdureka Cyber Security Masters Program: https://bit.ly/3pfHHIN ๐Ÿ”ฅEdureka CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl This "Cybersecurity tutorial" video presented by edureka gives an indepth information about the Cyber Security world and talks about its basic concepts.

From playlist Cyber Security Training for Beginners | Edureka

Related pages

Standard model (cryptography) | Chosen-plaintext attack | Random oracle | End-to-end encryption | Proxy re-encryption | Ciphertext | Chosen-ciphertext attack | Public key certificate | Collision resistance