Detailed Information

Cited 16 time in webofscience Cited 20 time in scopus
Metadata Downloads

Revocable hierarchical identity-based encryption

Full metadata record
DC Field Value Language
dc.contributor.authorSeo, Jae Hong-
dc.contributor.authorEmura, Keita-
dc.date.accessioned2022-07-07T13:32:50Z-
dc.date.available2022-07-07T13:32:50Z-
dc.date.created2021-05-13-
dc.date.issued2014-07-
dc.identifier.issn0304-3975-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/144592-
dc.description.abstractIn practice, revocation functionality is indispensable to the public key cryptosystems since there are threats of leaking a secret key by hacking or legal situation of expiration of contract for using system. In the public key infrastructure setting, numerous solutions have been proposed, and in the Identity Based Encryption (IBE) setting, a recent series of papers proposed revocable IBE schemes. Delegation of key generation is also an important functionality in cryptography from a practical standpoint since it allows reduction of excessive workload for a single key generation authority. Although efficient solutions for either revocation or delegation of key generation in IBE systems have been proposed, an important open problem is efficiently delegating both the key generation and revocation functionalities in IBE systems. Even if the goal is very natural, there are some obstacles to achieve both functionalities at the same time. Libert and Vergnaud, for instance, left this as an open problem in their CT-RSA 2009 paper. In this paper, we propose the first efficient solution for this problem. We prove the selective-ID security of our proposal under the Decisional Bilinear Diffie-Hellman assumption in the standard model.-
dc.language영어-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE BV-
dc.titleRevocable hierarchical identity-based encryption-
dc.typeArticle-
dc.contributor.affiliatedAuthorSeo, Jae Hong-
dc.identifier.doi10.1016/j.tcs.2014.04.031-
dc.identifier.scopusid2-s2.0-84926689049-
dc.identifier.wosid000339039900004-
dc.identifier.bibliographicCitationTHEORETICAL COMPUTER SCIENCE, v.542, pp.44 - 62-
dc.relation.isPartOfTHEORETICAL COMPUTER SCIENCE-
dc.citation.titleTHEORETICAL COMPUTER SCIENCE-
dc.citation.volume542-
dc.citation.startPage44-
dc.citation.endPage62-
dc.type.rimsART-
dc.type.docType정기학술지(Article(Perspective Article포함))-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusDelegation-
dc.subject.keywordPlusDiffie-Hellman assumption-
dc.subject.keywordPlusHierarchical identity-based encryptions-
dc.subject.keywordPlusIdentity Based Encryption-
dc.subject.keywordPlusPublic key cryptosystems-
dc.subject.keywordPlusPublic key infrastructure-
dc.subject.keywordPlusRevocation-
dc.subject.keywordPlusThe standard model-
dc.subject.keywordAuthor(Hierarchical) identity-based encryption-
dc.subject.keywordAuthorDelegation-
dc.subject.keywordAuthorRevocation-
dc.identifier.urlhttps://www.sciencedirect.com/science/article/pii/S0304397514003363?via%3Dihub-
Files in This Item
Go to Link
Appears in
Collections
서울 자연과학대학 > 서울 수학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Seo, Jae Hong photo

Seo, Jae Hong
COLLEGE OF NATURAL SCIENCES (DEPARTMENT OF MATHEMATICS)
Read more

Altmetrics

Total Views & Downloads

BROWSE