Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
From MaRDI portal
Publication:5451087
DOI10.1007/11593447_27zbMATH Open1154.94393OpenAlexW2136932282MaRDI QIDQ5451087FDOQ5451087
Authors: Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_27
Recommendations
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- Revocable IBE systems with almost constant-size key update
- Key updating technique in identity-based encryption
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
Cited In (17)
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
- Key updating technique in identity-based encryption
- Key Insulation and Intrusion Resilience over a Public Channel
- Identity-based encryption with hierarchical key-insulation in the standard model
- Attribute-based key-insulated signature and its applications
- A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- An improved certificateless strong key-insulated signature scheme in the standard model
- Revocable identity-based encryption revisited: security model and construction
- Leakage resilient strong key-insulated signatures in public channel
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Extended dual system group and shorter unbounded hierarchical identity based encryption
- Title not available (Why is that?)
- Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves
- Revocable hierarchical identity-based encryption
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Constructions of CCA-Secure Revocable Identity-Based Encryption
This page was built for publication: Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451087)