Efficient revocable identity-based encryption via subset difference methods
From MaRDI portal
Recommendations
- Adaptive-ID secure revocable identity-based encryption from lattices via subset difference method
- Efficient revocable identity-based encryption with short public parameters
- Revocable IBE systems with almost constant-size key update
- Revocable identity-based encryption from the computational Diffie-Hellman problem
- Adaptive-ID Secure Revocable Identity-Based Encryption
Cites work
- scientific article; zbMATH DE number 1302843 (Why is no real title available?)
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 1942412 (Why is no real title available?)
- scientific article; zbMATH DE number 2009961 (Why is no real title available?)
- scientific article; zbMATH DE number 1759344 (Why is no real title available?)
- scientific article; zbMATH DE number 2086725 (Why is no real title available?)
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Conjunctive Broadcast and Attribute-Based Encryption
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Dynamic credentials and ciphertext delegation for attribute-based encryption
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Establishing the broadcast efficiency of the subset difference revocation scheme
- Fully private revocable predicate encryption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Functional encryption with bounded collusions via multi-party computation
- Functional encryption: definitions and challenges
- Fuzzy Identity-Based Encryption
- Hierarchical ID-Based Cryptography
- Hierarchical Predicate Encryption for Inner-Products
- Identity-based cryptosystems and signature schemes
- Improved hidden vector encryption with short ciphertexts and tokens
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Public-key revocation and tracing schemes with subset difference methods revisited
- Revocable IBE systems with almost constant-size key update
- Revocable identity-based encryption revisited: security model and construction
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
- Tools for simulating features of composite order bilinear groups in the prime order setting
Cited in
(23)- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
- Revocable identity-based encryption from the computational Diffie-Hellman problem
- Efficient revocable identity-based encryption with short public parameters
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- Adaptive-ID secure revocable identity-based encryption from lattices via subset difference method
- ID-based public key cryptographic systems
- Key updating technique in identity-based encryption
- Revocable hierarchical identity-based encryption via history-free approach
- Forward-secure revocable identity-based encryption
- Revocable identity-based encryption from codes with rank metric
- Making the identity-based Diffie-Hellman key exchange efficiently revocable
- Revocable hierarchical identity-based encryption with adaptive security
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Identity-based broadcast encryption with efficient revocation
- Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Generic constructions of revocable identity-based encryption
- Revocable IBE systems with almost constant-size key update
- Self-updatable encryption with short public parameters and its extensions
- Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
This page was built for publication: Efficient revocable identity-based encryption via subset difference methods
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2402970)