Key updating technique in identity-based encryption
From MaRDI portal
Publication:545363
DOI10.1016/J.INS.2011.01.022zbMATH Open1217.94101OpenAlexW2028500276WikidataQ121307390 ScholiaQ121307390MaRDI QIDQ545363FDOQ545363
Authors: Shengli Liu, Yu Long, Kefei Chen
Publication date: 22 June 2011
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2011.01.022
Recommendations
- Revocable IBE systems with almost constant-size key update
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- A fully secure revocable ID-based encryption in the standard model
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Efficient revocable identity-based encryption via subset difference methods
Cites Work
Cited In (7)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Revocable IBE systems with almost constant-size key update
- Applied Cryptography and Network Security
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
- Secure key-updating for lazy revocation
This page was built for publication: Key updating technique in identity-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q545363)