Revocable hierarchical identity-based encryption
From MaRDI portal
Publication:2015131
Recommendations
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Revocable hierarchical identity-based encryption via history-free approach
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- RHIBE: constructing revocable hierarchical ID-based encryption from HIBE
- Efficient revocable identity-based encryption with short public parameters
Cites work
- scientific article; zbMATH DE number 2086699 (Why is no real title available?)
- scientific article; zbMATH DE number 2086725 (Why is no real title available?)
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Fuzzy Identity-Based Encryption
- Generic constructions of parallel key-insulated encryption
- Hierarchical ID-Based Cryptography
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Identity-based cryptosystems and signature schemes
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Parallel Key-Insulated Public Key Encryption Without Random Oracles
- Practical Identity-Based Encryption Without Random Oracles
- Revocable Identity-Based Encryption from Lattices
- Revocable identity-based encryption revisited: security model and construction
- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
- Unbounded HIBE and Attribute-Based Encryption
Cited in
(10)- New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
- Efficient revocable identity-based encryption with short public parameters
- ID-based public key cryptographic systems
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Revocable hierarchical identity-based encryption via history-free approach
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
- Revocable hierarchical identity-based authenticated key exchange
- Mergeable and revocable identity-based encryption
- Key dependent message security for revocable identity-based encryption and identity-based encryption
This page was built for publication: Revocable hierarchical identity-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2015131)