For identity-based encryption (IBE), if a user’s private key is compromised, the security of his/her ciphertexts will fail completely. Revocation capability provides an effective way to mitigate above harm, so that the adversary cannot access to future ciphertexts anymore. However, current revocable IBE schemes do not provide any means to guarantee the security of the user’s previous ciphertexts. In this paper, we propose a new cryptographic primitive, namely forward-secure revocable identity-based encryption (FS-RIBE), to address this issue. In FS-RIBE, when the event of full exposure of the user’s current private key occurs, the forward security can guarantee that the user’s private keys prior to this remain secure, while the revocation c...
International audienceIdentity-Based Encryption (IBE) offers an interesting alternative to PKI-enabl...
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption sche...
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption ...
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identit...
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identit...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maint...
In the context of Identity-Based Encryption (IBE), both revocation and delegation of key generation ...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminat...
Over the last few years, identity (ID)-based encryption (IBE) without requiring certificate manageme...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public k...
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted...
Identity-based encryption (IBE) has been extensively studied and widely used in various applications...
We propose a thought called revocable-storage identity-based encryption (RS-IBE), which can give the...
Identity-based encryption (IBE) has been regarded as an attractive alternative to more conventional ...
International audienceIdentity-Based Encryption (IBE) offers an interesting alternative to PKI-enabl...
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption sche...
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption ...
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identit...
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identit...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maint...
In the context of Identity-Based Encryption (IBE), both revocation and delegation of key generation ...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminat...
Over the last few years, identity (ID)-based encryption (IBE) without requiring certificate manageme...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public k...
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted...
Identity-based encryption (IBE) has been extensively studied and widely used in various applications...
We propose a thought called revocable-storage identity-based encryption (RS-IBE), which can give the...
Identity-based encryption (IBE) has been regarded as an attractive alternative to more conventional ...
International audienceIdentity-Based Encryption (IBE) offers an interesting alternative to PKI-enabl...
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption sche...
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption ...