CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
From MaRDI portal
Publication:1626131
DOI10.1504/IJACT.2017.086229zbMath1428.94078OpenAlexW4230895451WikidataQ121438938 ScholiaQ121438938MaRDI QIDQ1626131
Junji Shikata, Yuu Ishida, Yodai Watanabe
Publication date: 26 November 2018
Published in: International Journal of Applied Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1504/ijact.2017.086229
key encapsulation mechanismCCA-securitycomplete subtree methodcomposite-order bilinear groupKEM/DEM frameworkprime-order bilinear grouprevocable identity-based encryption
Related Items (5)
Generic Constructions of Revocable Identity-Based Encryption ⋮ Forward-secure revocable identity-based encryption ⋮ Efficient identity-based encryption with hierarchical key-insulation from HIBE ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
This page was built for publication: CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance