Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Identity-based encryption with efficient revocation
Proceedings of the 15th ACM conference on Computer and communications security
Adaptive-ID Secure Revocable Identity-Based Encryption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Optimal subset-difference broadcast encryption with free riders
Information Sciences: an International Journal
Efficient broadcast encryption with user profiles
Information Sciences: an International Journal
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Randomness criteria in binary visibility graph and complex network perspective
Information Sciences: an International Journal
Hi-index | 0.07 |
Key revocation is critical for the practicality of any public key cryptosystem and identity-based encryption (IBE) system. When a user's private key is compromised, it is important for him/her to revoke his/her key. Up to now, little work has been published on key revocation in IBE systems. We propose a low-complexity key update technique to solve the revocation problem in an IBE system in which any revoked user is able to re-join the system without changing his or her identity or re-setup the system.