Adaptive-ID Secure Revocable Identity-Based Encryption
From MaRDI portal
Publication:3623031
DOI10.1007/978-3-642-00862-7_1zbMath1237.94070OpenAlexW1756601563MaRDI QIDQ3623031
Benoît Libert, Damien Vergnaud
Publication date: 29 April 2009
Published in: Topics in Cryptology – CT-RSA 2009 (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/inria-00417807/file/ct-rsa09.pdf
Related Items (28)
Self-updatable encryption with short public parameters and its extensions ⋮ Generic Constructions of Revocable Identity-Based Encryption ⋮ Constructions of CCA-Secure Revocable Identity-Based Encryption ⋮ Efficient revocable identity-based encryption with short public parameters ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ Revocable hierarchical identity-based encryption with shorter private keys and update keys ⋮ Forward-secure revocable identity-based encryption ⋮ Universally Composable Cryptographic Role-Based Access Control ⋮ Fully secure revocable attribute-based encryption ⋮ Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance ⋮ Simplified server-aided revocable identity-based encryption from lattices ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ Revocable hierarchical identity-based encryption via history-free approach ⋮ New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters ⋮ (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance ⋮ Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation ⋮ Key updating technique in identity-based encryption ⋮ Revocable hierarchical identity-based encryption ⋮ Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Revocable hierarchical identity-based encryption with adaptive security ⋮ Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity ⋮ Revocable identity-based encryption with server-aided ciphertext evolution ⋮ CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution ⋮ Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A tapestry of identity-based encryption: practical frameworks compared
- Efficient revocation and threshold pairing based cryptosystems
- Identity-Based Cryptosystems and Signature Schemes
- The random oracle methodology, revisited
- Practical Identity-Based Encryption Without Random Oracles
- A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption
- Generalized Identity Based and Broadcast Encryption Schemes
- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
- Hierarchical ID-Based Cryptography
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Topics in Cryptology – CT-RSA 2005
- Public Key Cryptography – PKC 2004
- Public Key Cryptography – PKC 2004
This page was built for publication: Adaptive-ID Secure Revocable Identity-Based Encryption