Revocable hierarchical identity-based encryption
From MaRDI portal
Publication:2015131
DOI10.1016/J.TCS.2014.04.031zbMATH Open1338.94081OpenAlexW2019820223WikidataQ121365510 ScholiaQ121365510MaRDI QIDQ2015131FDOQ2015131
Authors: Jae Hong Seo, Keita Emura
Publication date: 23 June 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.04.031
Recommendations
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Revocable hierarchical identity-based encryption via history-free approach
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- RHIBE: constructing revocable hierarchical ID-based encryption from HIBE
- Efficient revocable identity-based encryption with short public parameters
Cites Work
- Identity-based cryptosystems and signature schemes
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Practical Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Hierarchical ID-Based Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Revocable identity-based encryption revisited: security model and construction
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
- Unbounded HIBE and Attribute-Based Encryption
- Parallel Key-Insulated Public Key Encryption Without Random Oracles
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Revocable Identity-Based Encryption from Lattices
- Generic constructions of parallel key-insulated encryption
Cited In (10)
- Revocable hierarchical identity-based authenticated key exchange
- Key dependent message security for revocable identity-based encryption and identity-based encryption
- Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Mergeable and revocable identity-based encryption
- Efficient revocable identity-based encryption with short public parameters
- Revocable hierarchical identity-based encryption via history-free approach
- New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
- ID-based public key cryptographic systems
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
This page was built for publication: Revocable hierarchical identity-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2015131)