Identity-based encryption (IBE) has been extensively studied and widely used in various applications since Boneh and Franklin proposed the first practical scheme based on pairing. In that seminal work, it has also been pointed out that providing an efficient revocation mechanism for IBE is essential. Hence, revocable identity-based encryption (RIBE) has been proposed in the literature to offer an efficient revocation mechanism. In contrast to revocation, another issue that will also occur in practice is to combine two or multiple IBE systems into one system, e.g., due to the merge of the departments or companies. However, this issue has not been formally studied in the literature and the naive solution of creating a completely new system is...
For identity-based encryption (IBE), if a user’s private key is compromised, the security of his/her...
Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE) whe...
Over the past decade, the emerging of pairing-based cryptography has attracted not only the attentio...
Identity-based encryption (IBE) has been extensively studied and widely used in various applications...
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identit...
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identit...
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption ...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminat...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maint...
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public k...
Over the last few years, identity (ID)-based encryption (IBE) without requiring certificate manageme...
We propose a thought called revocable-storage identity-based encryption (RS-IBE), which can give the...
Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send...
For identity-based encryption (IBE), if a user’s private key is compromised, the security of his/her...
Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE) whe...
Over the past decade, the emerging of pairing-based cryptography has attracted not only the attentio...
Identity-based encryption (IBE) has been extensively studied and widely used in various applications...
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identit...
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identit...
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption ...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminat...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maint...
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public k...
Over the last few years, identity (ID)-based encryption (IBE) without requiring certificate manageme...
We propose a thought called revocable-storage identity-based encryption (RS-IBE), which can give the...
Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send...
For identity-based encryption (IBE), if a user’s private key is compromised, the security of his/her...
Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE) whe...
Over the past decade, the emerging of pairing-based cryptography has attracted not only the attentio...