Revocable hierarchical identity-based encryption
From MaRDI portal
Publication:2015131
DOI10.1016/j.tcs.2014.04.031zbMath1338.94081OpenAlexW2019820223WikidataQ121365510 ScholiaQ121365510MaRDI QIDQ2015131
Publication date: 23 June 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.04.031
Related Items (6)
Efficient revocable identity-based encryption with short public parameters ⋮ Revocable hierarchical identity-based encryption via history-free approach ⋮ New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters ⋮ Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts ⋮ Revocable hierarchical identity-based authenticated key exchange ⋮ Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Revocable Identity-Based Encryption from Lattices
- Identity-Based Cryptosystems and Signature Schemes
- Unbounded HIBE and Attribute-Based Encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Generic Constructions of Parallel Key-Insulated Encryption
- Practical Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Hierarchical ID-Based Cryptography
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Parallel Key-Insulated Public Key Encryption Without Random Oracles
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: Revocable hierarchical identity-based encryption