more lightweight versions of mediated cryptography while maintaining the ability for
instantaneous revocation of keys. Moreover, our solutions avoid key escrow, which has
been used in all previous mediated cryptography algorithms. We provide a model of security
against a fully-adaptive chosen ciphertext attacker, who may be a rogue key generation
centre or any coalition of rogue users. We present a generic construction and also a …