Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
From MaRDI portal
Publication:2200685
DOI10.1016/j.ins.2018.09.020zbMath1441.94083OpenAlexW2891411101MaRDI QIDQ2200685
Fuchun Guo, Rongmao Chen, Yi Mu, Willy Susilo, Man Ho Au, Guomin Yang, Jianchang Lai, Peng Jiang
Publication date: 22 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.09.020
enhanced security modelidentity-based revocation systemincreasing maximal revocation numbershort-parameter construction
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-based broadcast encryption with continuous leakage resilience
- Anonymous certificate-based broadcast encryption with constant decryption cost
- A tapestry of identity-based encryption: practical frameworks compared
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys
- Low Overhead Broadcast Encryption from Multilinear Maps
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
- Public Key Broadcast Encryption for Stateless Receivers
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Constant Size Ciphertexts in Threshold Attribute-Based Encryption
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- Practical Identity-Based Encryption Without Random Oracles
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Identity-Based Encryption from the Weil Pairing
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Secure integration of asymmetric and symmetric encryption schemes
- Anonymous Multireceiver Identity-Based Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Efficient Broadcast Encryption Using Multiple Interpolation Methods
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
This page was built for publication: Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters