Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price ...
Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send...
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminat...
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identit...
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption ...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maint...
Identity-based encryption (IBE) has been extensively studied and widely used in various applications...
Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important si...
For identity-based encryption (IBE), if a user’s private key is compromised, the security of his/her...
Over the last few years, identity (ID)-based encryption (IBE) without requiring certificate manageme...
Identity-based encryption (IBE) has been regarded as an attractive alternative to more conventional ...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public k...
In the context of Identity-Based Encryption (IBE), both revocation and delegation of key generation ...
We propose a thought called revocable-storage identity-based encryption (RS-IBE), which can give the...
Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send...
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminat...
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identit...
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption ...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maint...
Identity-based encryption (IBE) has been extensively studied and widely used in various applications...
Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important si...
For identity-based encryption (IBE), if a user’s private key is compromised, the security of his/her...
Over the last few years, identity (ID)-based encryption (IBE) without requiring certificate manageme...
Identity-based encryption (IBE) has been regarded as an attractive alternative to more conventional ...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public k...
In the context of Identity-Based Encryption (IBE), both revocation and delegation of key generation ...
We propose a thought called revocable-storage identity-based encryption (RS-IBE), which can give the...
Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send...
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminat...