At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re-distributes users' decryption keys, it runs the risk of being caught and prosecuted. Goyal proposed two constructions: the first one is efficient but can only trace well-formed decryption keys to their source; the second one allows tracing obfuscated decryption boxes in a model (called weak black-box model) where cheating authorities have no decryption oracle. The latter scheme is unfortunately far less efficient in terms of decryption cost and ciphertext size. In this work, we propose a ne...
Abstract. In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with ...
Over the last few years, identity (ID)-based encryption (IBE) without requiring certificate manageme...
To ensure the security of sensitive data, people need to encrypt them before uploading them to the p...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption (A-IBE...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
International audienceAt Crypto'07, Goyal introduced the concept of Accountable Authority Identity-B...
A well-known concern in the setting of identity based en-cryption is that the PKG is all powerful an...
Accountable identity-based encryption (A-IBE) was proposed to relieve the key escrow problem caused ...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
© 2019 Elsevier B.V. Identity-based broadcast encryption (IBBE) enables a sender to broadcast a mess...
© 2019 The British Computer Society. All rights reserved. Identity-based revocation system (IBRS) ge...
Accountable authority identity-based encryption (A-IBE), as an attractive way to guarantee the user ...
Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key ...
In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator ...
Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable approach to...
Abstract. In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with ...
Over the last few years, identity (ID)-based encryption (IBE) without requiring certificate manageme...
To ensure the security of sensitive data, people need to encrypt them before uploading them to the p...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption (A-IBE...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
International audienceAt Crypto'07, Goyal introduced the concept of Accountable Authority Identity-B...
A well-known concern in the setting of identity based en-cryption is that the PKG is all powerful an...
Accountable identity-based encryption (A-IBE) was proposed to relieve the key escrow problem caused ...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
© 2019 Elsevier B.V. Identity-based broadcast encryption (IBBE) enables a sender to broadcast a mess...
© 2019 The British Computer Society. All rights reserved. Identity-based revocation system (IBRS) ge...
Accountable authority identity-based encryption (A-IBE), as an attractive way to guarantee the user ...
Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key ...
In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator ...
Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable approach to...
Abstract. In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with ...
Over the last few years, identity (ID)-based encryption (IBE) without requiring certificate manageme...
To ensure the security of sensitive data, people need to encrypt them before uploading them to the p...