Revocable hierarchical identity-based encryption with shorter private keys and update keys
From MaRDI portal
Publication:1671645
DOI10.1007/s10623-017-0453-2zbMath1408.94944OpenAlexW2782916932WikidataQ122928791 ScholiaQ122928791MaRDI QIDQ1671645
Publication date: 6 September 2018
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-017-0453-2
bilinear mapsidentity-based encryptionmodular designhierarchical identity-based encryptionkey revocation
Related Items (12)
Generic Constructions of Revocable Identity-Based Encryption ⋮ Efficient revocable identity-based encryption with short public parameters ⋮ Forward-secure revocable identity-based encryption ⋮ Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance ⋮ Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more ⋮ Efficient identity-based encryption with hierarchical key-insulation from HIBE ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Revocable hierarchical identity-based encryption with adaptive security ⋮ Revocable attribute-based proxy re-encryption ⋮ Revocable identity-based encryption with server-aided ciphertext evolution ⋮ Revocable hierarchical identity-based authenticated key exchange ⋮ Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient selective identity-based encryption without random oracles
- Adaptive-ID secure revocable hierarchical identity-based encryption
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Efficient revocable identity-based encryption via subset difference methods
- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Identity-Based Cryptosystems and Signature Schemes
- New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
- Unbounded HIBE and Attribute-Based Encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Delegating Capabilities in Predicate Encryption Systems
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Adaptive-ID Secure Revocable Identity-Based Encryption
- New directions in cryptography
- Hierarchical ID-Based Cryptography
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- General Ad Hoc Encryption from Exponent Inversion IBE
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: Revocable hierarchical identity-based encryption with shorter private keys and update keys