Mergeable and revocable identity-based encryption
Identity-based encryption (IBE) has been extensively studied and widely used in various applications since Boneh and Franklin proposed the first practical scheme based on pairing. In that seminal work, it has also been pointed out that providing an efficient revocation mechanism for IBE is essential...
Saved in:
Main Authors: | XU, Shengmin, YANG, Guomin, MU, Yi, SUSILO, Willy |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5208 https://ink.library.smu.edu.sg/context/sis_research/article/6211/viewcontent/Information_Security_and_Privacy.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext
by: SUSILO, Willy, et al.
Published: (2016) -
Simple identity-based encryption with mediated RSA
by: DING, Xuhua, et al.
Published: (2013) -
Server-aided revocable attribute-based encryption
by: CUI, Hui, et al.
Published: (2016) -
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
by: XU, Shengmin, et al.
Published: (2019) -
Proxy signature with revocation
by: XU, Shengmin, et al.
Published: (2016)