Revocable Identity-Based Encryption Revisited: Security Model and Construction

From MaRDI portal
Revision as of 06:38, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4916011

DOI10.1007/978-3-642-36362-7_14zbMath1314.94092OpenAlexW2184323066MaRDI QIDQ4916011

Jae Hong Seo, Keita Emura

Publication date: 19 April 2013

Published in: Public-Key Cryptography – PKC 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-36362-7_14




Related Items (29)

Self-updatable encryption with short public parameters and its extensionsGeneric Constructions of Revocable Identity-Based EncryptionExtended dual system group and shorter unbounded hierarchical identity based encryptionRevocable policy-based chameleon hashServer-aided revocable attribute-based encryption revised: multi-user setting and fully secureConstructions of CCA-Secure Revocable Identity-Based EncryptionGeneric constructions for fully secure revocable attribute-based encryptionEfficient revocable identity-based encryption with short public parametersEfficient revocable identity-based encryption via subset difference methodsRevocable hierarchical identity-based encryption with shorter private keys and update keysForward-secure revocable identity-based encryptionSimplified server-aided revocable identity-based encryption from latticesIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersRevocable hierarchical identity-based encryption via history-free approachNew Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistanceSimplified Revocable Hierarchical Identity-Based Encryption from LatticesEfficient identity-based encryption with hierarchical key-insulation from HIBESelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyIRIBE: intrusion-resilient identity-based encryptionRevocable attribute-based encryption with decryption key exposure resistance and ciphertext delegationRevocable hierarchical identity-based encryptionRevocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short CiphertextsAdaptively secure revocable hierarchical IBE from \(k\)-linear assumptionRevocable hierarchical identity-based encryption with adaptive securityAdaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityRevocable identity-based encryption with server-aided ciphertext evolutionCCA-Secure and Revocable Certificateless Encryption with Ciphertext EvolutionLattice-based revocable (hierarchical) IBE with decryption key exposure resistance



Cites Work


This page was built for publication: Revocable Identity-Based Encryption Revisited: Security Model and Construction