Identity-based encryption with outsourced revocation in cloud computing

J Li, J Li, X Chen, C Jia, W Lou - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Identity-Based Encryption (IBE) which simplifies the public key and certificate management
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …

Identity-based encryption with efficient revocation

A Boldyreva, V Goyal, V Kumar - … of the 15th ACM conference on …, 2008 - dl.acm.org
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE
eliminates the need for a Public Key Infrastructure (PKI). The senders using an IBE do not …

Revocable identity-based encryption revisited: Security model and construction

JH Seo, K Emura - Public-Key Cryptography–PKC 2013: 16th International …, 2013 - Springer
Abstract In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an
Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE) …

Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions.

S Gadde, GS Rao, VS Veesam… - … des Systèmes d' …, 2023 - search.ebscohost.com
Cloud computing has emerged as a pivotal trend across both commercial and academic
sectors, offering substantial storage capabilities to service providers and end-users …

Server-aided revocable attribute-based encryption

H Cui, RH Deng, Y Li, B Qin - … : 21st European Symposium on Research in …, 2016 - Springer
As a one-to-many public key encryption system, attribute-based encryption (ABE) enables
scalable access control over encrypted data in cloud storage services. However, efficient …

Certificateless Key‐Insulated Generalized Signcryption Scheme without Bilinear Pairings

C Zhou, Z Zhao, W Zhou, Y Mei - Security and Communication …, 2017 - Wiley Online Library
Generalized signcryption (GSC) can be applied as an encryption scheme, a signature
scheme, or a signcryption scheme with only one algorithm and one key pair. A key‐insulated …

Efficient delegation of key generation and revocation functionalities in identity-based encryption

JH Seo, K Emura - Topics in Cryptology–CT-RSA 2013: The …, 2013 - Springer
In the public key cryptosystems, revocation functionality is required when a secret key is
corrupted by hacking or the period of a contract expires. In the public key infrastructure …

Revocable identity-based cryptosystem revisited: Security models and constructions

JH Seo, K Emura - IEEE Transactions on Information Forensics …, 2014 - ieeexplore.ieee.org
Boneh and Franklin gave a naive revocation method in identity-based encryption (IBE)
which imposes a huge overhead into the key generation center. Later, Boldyreva, Goyal …

[PDF][PDF] Identity Based Key-Insulated Encryption with Outsourced Equality Test.

S Alornyo, Y Zhao, G Zhu, H Xiong - Int. J. Netw. Secur., 2020 - tutagktu.com
We firstly combine the concepts of key-insulated encryption (KIE) and identity-based
encryption with the equality test (IBE-ET) to obtain identity-based keyinsulated encryption …

Identity-based key-insulated signature with secure key-updates

J Weng, S Liu, K Chen, X Li - … , Inscrypt 2006, Beijing, China, November 29 …, 2006 - Springer
Standard identity-based (ID-based) signature schemes typically rely on the assumption that
secret keys are kept perfectly secure. However, with more and more cryptographic primitives …