Key updating technique in identity-based encryption
From MaRDI portal
Recommendations
- Revocable IBE systems with almost constant-size key update
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- A fully secure revocable ID-based encryption in the standard model
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Efficient revocable identity-based encryption via subset difference methods
Cites work
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Fuzzy Identity-Based Encryption
- Identity-based cryptosystems and signature schemes
- Optimal subset-difference broadcast encryption with free riders
Cited in
(7)- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Secure key-updating for lazy revocation
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
- Applied Cryptography and Network Security
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Revocable IBE systems with almost constant-size key update
This page was built for publication: Key updating technique in identity-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q545363)