(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
From MaRDI portal
Publication:2214962
DOI10.1016/J.INS.2019.03.053zbMath1451.68094OpenAlexW2932092065WikidataQ123132634 ScholiaQ123132634MaRDI QIDQ2214962
Qinglan Zhao, Baodong Qin, Dong Zheng, Hui Cui
Publication date: 10 December 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2019.03.053
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
- Key updating technique in identity-based encryption
- Server-aided revocable attribute-based encryption
- Key-policy attribute-based encryption against continual auxiliary input leakage
- Hierarchical attribute based encryption with continuous leakage-resilience
- Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance
- Revocable Identity-Based Encryption from Lattices
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Efficient revocation and threshold pairing based cryptosystems
- New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
- Conjunctive Broadcast and Attribute-Based Encryption
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Server-Aided Revocable Identity-Based Encryption
- Attribute-Based Encryption Optimized for Cloud Computing
- Advances in Cryptology - EUROCRYPT 2004
- Fuzzy Identity-Based Encryption
- Public Key Cryptography – PKC 2004
This page was built for publication: (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance