Identity-Based Encryption with Outsourced Revocation in Cloud Computing
From MaRDI portal
Publication:2982392
DOI10.1109/TC.2013.208zbMath1360.68437WikidataQ121084323 ScholiaQ121084323MaRDI QIDQ2982392
Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jin Li, Wenjing Lou
Publication date: 16 May 2017
Published in: IEEE Transactions on Computers (Search for Journal in Brave)
Related Items (14)
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage ⋮ Identity-based data storage scheme with anonymous key generation in fog computing ⋮ Verifiable inner product computation on outsourced database for authenticated multi-user data sharing ⋮ Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey ⋮ Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack ⋮ Differentially private naive Bayes learning over multiple data sources ⋮ Notes on a provably-secure certificate-based encryption against malicious CA attacks ⋮ Secure multi-label data classification in cloud by additionally homomorphic encryption ⋮ Identity-based key-exposure resilient cloud storage public auditing scheme from lattices ⋮ Analyses and encryption implementation of a new chaotic system based on semitensor product ⋮ Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage ⋮ Practical public key encryption with selective opening security for receivers ⋮ Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks ⋮ Revocable identity-based encryption with server-aided ciphertext evolution
This page was built for publication: Identity-Based Encryption with Outsourced Revocation in Cloud Computing