Revocable hierarchical identity-based encryption
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seo, Jae Hong | - |
dc.contributor.author | Emura, Keita | - |
dc.date.accessioned | 2022-07-07T13:32:50Z | - |
dc.date.available | 2022-07-07T13:32:50Z | - |
dc.date.created | 2021-05-13 | - |
dc.date.issued | 2014-07 | - |
dc.identifier.issn | 0304-3975 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/144592 | - |
dc.description.abstract | In practice, revocation functionality is indispensable to the public key cryptosystems since there are threats of leaking a secret key by hacking or legal situation of expiration of contract for using system. In the public key infrastructure setting, numerous solutions have been proposed, and in the Identity Based Encryption (IBE) setting, a recent series of papers proposed revocable IBE schemes. Delegation of key generation is also an important functionality in cryptography from a practical standpoint since it allows reduction of excessive workload for a single key generation authority. Although efficient solutions for either revocation or delegation of key generation in IBE systems have been proposed, an important open problem is efficiently delegating both the key generation and revocation functionalities in IBE systems. Even if the goal is very natural, there are some obstacles to achieve both functionalities at the same time. Libert and Vergnaud, for instance, left this as an open problem in their CT-RSA 2009 paper. In this paper, we propose the first efficient solution for this problem. We prove the selective-ID security of our proposal under the Decisional Bilinear Diffie-Hellman assumption in the standard model. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.title | Revocable hierarchical identity-based encryption | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Seo, Jae Hong | - |
dc.identifier.doi | 10.1016/j.tcs.2014.04.031 | - |
dc.identifier.scopusid | 2-s2.0-84926689049 | - |
dc.identifier.wosid | 000339039900004 | - |
dc.identifier.bibliographicCitation | THEORETICAL COMPUTER SCIENCE, v.542, pp.44 - 62 | - |
dc.relation.isPartOf | THEORETICAL COMPUTER SCIENCE | - |
dc.citation.title | THEORETICAL COMPUTER SCIENCE | - |
dc.citation.volume | 542 | - |
dc.citation.startPage | 44 | - |
dc.citation.endPage | 62 | - |
dc.type.rims | ART | - |
dc.type.docType | 정기학술지(Article(Perspective Article포함)) | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | Delegation | - |
dc.subject.keywordPlus | Diffie-Hellman assumption | - |
dc.subject.keywordPlus | Hierarchical identity-based encryptions | - |
dc.subject.keywordPlus | Identity Based Encryption | - |
dc.subject.keywordPlus | Public key cryptosystems | - |
dc.subject.keywordPlus | Public key infrastructure | - |
dc.subject.keywordPlus | Revocation | - |
dc.subject.keywordPlus | The standard model | - |
dc.subject.keywordAuthor | (Hierarchical) identity-based encryption | - |
dc.subject.keywordAuthor | Delegation | - |
dc.subject.keywordAuthor | Revocation | - |
dc.identifier.url | https://www.sciencedirect.com/science/article/pii/S0304397514003363?via%3Dihub | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.