Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters
暂无分享,去创建一个
[1] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[2] Kwangsu Lee,et al. Revocable hierarchical identity-based encryption with shorter private keys and update keys , 2018, Designs, Codes and Cryptography.
[3] Dong Hoon Lee,et al. Efficient revocable identity-based encryption via subset difference methods , 2017, Des. Codes Cryptogr..
[4] Yohei Watanabe,et al. New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters , 2017, CT-RSA.
[5] Yuh-Min Tseng,et al. RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE , 2014, Informatica.
[6] Benoît Libert,et al. Adaptive-ID Secure Revocable Identity-Based Encryption , 2009, CT-RSA.
[7] Keita Emura,et al. Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts , 2015, CT-RSA.
[8] Dong Hoon Lee,et al. Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation , 2015, WISA.
[9] Keita Emura,et al. Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption , 2013, CT-RSA.
[10] Yong Tang,et al. Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[11] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[12] Allison Bishop,et al. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..
[13] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[14] Allison Bishop,et al. Unbounded HIBE and Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[15] Kwangsu Lee. Revocable Hierarchical Identity-Based Encryption with Adaptive Security , 2016, IACR Cryptol. ePrint Arch..
[16] Keita Emura,et al. Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions , 2014, IEEE Transactions on Information Forensics and Security.
[17] Keita Emura,et al. Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption , 2015, IWSEC.
[18] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[19] Changji Wang,et al. An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme , 2014, PloS one.
[20] Brent Waters,et al. Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.
[21] Dong Hoon Lee,et al. Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency , 2013, Theor. Comput. Sci..