Revocable Identity-Based Encryption Revisited: Security Model and Construction
From MaRDI portal
Publication:4916011
DOI10.1007/978-3-642-36362-7_14zbMath1314.94092OpenAlexW2184323066MaRDI QIDQ4916011
Publication date: 19 April 2013
Published in: Public-Key Cryptography – PKC 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36362-7_14
Related Items (29)
Self-updatable encryption with short public parameters and its extensions ⋮ Generic Constructions of Revocable Identity-Based Encryption ⋮ Extended dual system group and shorter unbounded hierarchical identity based encryption ⋮ Revocable policy-based chameleon hash ⋮ Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure ⋮ Constructions of CCA-Secure Revocable Identity-Based Encryption ⋮ Generic constructions for fully secure revocable attribute-based encryption ⋮ Efficient revocable identity-based encryption with short public parameters ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ Revocable hierarchical identity-based encryption with shorter private keys and update keys ⋮ Forward-secure revocable identity-based encryption ⋮ Simplified server-aided revocable identity-based encryption from lattices ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ Revocable hierarchical identity-based encryption via history-free approach ⋮ New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters ⋮ (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance ⋮ Simplified Revocable Hierarchical Identity-Based Encryption from Lattices ⋮ Efficient identity-based encryption with hierarchical key-insulation from HIBE ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ IRIBE: intrusion-resilient identity-based encryption ⋮ Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation ⋮ Revocable hierarchical identity-based encryption ⋮ Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Revocable hierarchical identity-based encryption with adaptive security ⋮ Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity ⋮ Revocable identity-based encryption with server-aided ciphertext evolution ⋮ CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution ⋮ Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- A forward-secure public-key encryption scheme
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Fully Private Revocable Predicate Encryption
- Revocable Identity-Based Encryption from Lattices
- Efficient revocation and threshold pairing based cryptosystems
- Conjunctive Broadcast and Attribute-Based Encryption
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Efficient Lattice (H)IBE in the Standard Model
- Generic Constructions of Parallel Key-Insulated Encryption
- Practical Identity-Based Encryption Without Random Oracles
- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Hierarchical Predicate Encryption for Inner-Products
- Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
- Identity-Based Encryption from the Weil Pairing
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Parallel Key-Insulated Public Key Encryption Without Random Oracles
- Topics in Cryptology – CT-RSA 2004
- Public Key Cryptography – PKC 2004
- Public Key Cryptography – PKC 2004
This page was built for publication: Revocable Identity-Based Encryption Revisited: Security Model and Construction