logo

SCIENCE CHINA Information Sciences, Volume 63 , Issue 3 : 139110(2020) https://doi.org/10.1007/s11432-018-9455-5

Space efficient revocable IBE for mobile devices in cloud computing

More info
  • ReceivedMar 15, 2018
  • AcceptedMay 17, 2018
  • PublishedFeb 11, 2020

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant No. 61502400, 61702105), Foundation of Sichuan Educational Committee (Grant No. 16ZB0140), and National Joint Fund of China (Grant No. U1636209).


Supplement

Appendixes A and B.


References

[1] Seo J H, Emura K. Revocable identity-based encryption revisited: security model and construction. In: Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, 2013. 216--234. Google Scholar

[2] Boldyreva A, Goyal V, Kumar V. Identity-based encryption with efficient revocation. In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, Alexandria, 2008. 417--426. Google Scholar

[3] Watanabe Y, Emura K, Seo J H. New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters. In: Proceedings of The Cryptographers' Track at the RSA Conference, San Francisco, 2017. 432--449. Google Scholar

[4] Lin H, Cao Z, Fang Y, et al. How to design space efficient revocable IBE from non-monotonic ABE In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, 2011. 381--385. Google Scholar

[5] Qin B D, Deng R H, Li Y J, et al. Server-aided revocable identity-based encryption. In: Proceedings of the 20th European Symposium on Research in Computer Security, Vienna, 2015. 286--304. Google Scholar

[6] Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, Alexandria, 2007. 195--203. Google Scholar

[7] De Caro A, Iovino V. jpbc: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, Kerkyra, 2011. 850--855. Google Scholar

Copyright 2020  CHINA SCIENCE PUBLISHING & MEDIA LTD.  中国科技出版传媒股份有限公司  版权所有

京ICP备14028887号-23       京公网安备11010102003388号