Revocable identity-based encryption revisited: Security model and construction

JH Seo, K Emura - Public-Key Cryptography–PKC 2013: 16th International …, 2013 - Springer
Abstract In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an
Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE) …

Secure data sharing in cloud computing using revocable-storage identity-based encryption

J Wei, W Liu, X Hu - IEEE Transactions on Cloud Computing, 2016 - ieeexplore.ieee.org
Cloud computing provides a flexible and convenient way for data sharing, which brings
various benefits for both the society and individuals. But there exists a natural resistance for …

Efficient identity-based distributed decryption scheme for electronic personal health record sharing system

Y Zhang, D He, MS Obaidat… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
The rapid development of the Internet of Things (IoT) has led to the emergence of more and
more novel applications in recent years. One of them is the e-health system, which can …

Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing

Y Yang, J Sun, Z Liu, YQ Qiao - Journal of Information Security and …, 2022 - Elsevier
Cloud computing provides enterprises and individuals with unlimited computing resources
and expandable storage space. However, data leakage occurs frequently due to the lack of …

Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance

S Katsumata, T Matsuda, A Takayasu - … on Practice and Theory of Public …, 2019 - Springer
Revocable identity-based encryption (RIBE) is an extension of IBE that supports a key
revocation mechanism, which is an indispensable feature for practical cryptographic …

Efficient delegation of key generation and revocation functionalities in identity-based encryption

JH Seo, K Emura - Topics in Cryptology–CT-RSA 2013: The …, 2013 - Springer
In the public key cryptosystems, revocation functionality is required when a secret key is
corrupted by hacking or the period of a contract expires. In the public key infrastructure …

Revocable attribute-based encryption from standard lattices

F Luo, S Al-Kuwari, H Wang, F Wang, K Chen - Computer Standards & …, 2023 - Elsevier
Attribute-based encryption (ABE) is an attractive extension of public key encryption, which
provides fine-grained and role-based access to encrypted data. In its key-policy flavor, the …

Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance

A Takayasu, Y Watanabe - … , ACISP 2017, Auckland, New Zealand, July 3 …, 2017 - Springer
A revocable identity-based encryption (RIBE) scheme, proposed by Boldyreva et al.,
provides a revocation functionality for managing a number of users dynamically and …

[图书][B] Mobile cloud computing: foundations and service models

D Huang, H Wu - 2017 - books.google.com
Mobile Cloud Computing: Foundations and Service Models combines cloud computing,
mobile computing and wireless networking to bring new computational resources for mobile …

New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters

Y Watanabe, K Emura, JH Seo - Topics in Cryptology–CT-RSA 2017: The …, 2017 - Springer
Revoking corrupted users is a desirable functionality for cryptosystems. Since Boldyreva,
Goyal, and Kumar (ACM CCS 2008) proposed a notable result for scalable revocation …