Efficient Revocable ID-Based Encryption with a Public Channel
Citations
48 citations
45 citations
45 citations
Cites background or methods from "Efficient Revocable ID-Based Encryp..."
...Since then, some related literature has been presented, such as user authentication schemes [3, 24], encryption schemes [7, 15, 23, 26], signature schemes [3, 10, 25, 32], key agreement protocols [11, 27,...
[...]
...similar technique in [23] to calculate the probability....
[...]
34 citations
Cites background or methods from "Efficient Revocable ID-Based Encryp..."
...Table I lists the comparisons among the traditional PKS [1], [2], ID-PKS [7], revocable ID-PKS (RID-PKS) [32], CB-PKS [12], CL-PKS [13], and our proposed RCL-PKS constructions in terms of averting the key escrow problem, the level of trust that is placed on the KGC, the computational cost for encryption/decryption, and the required certificates and revocable functionality....
[...]
...It is obvious that both the ID-PKS [7] and RID-PKS [32] constructions suffer from the key escrow problem....
[...]
...Tung-Tso Tsai received the B.S. degree from Chinese Culture University, Taipei, Taiwan, in 2006 and the M.S. degree from the National Hsinchu University of Education, Hsinchu, Taiwan, in 2009....
[...]
...In order to improve the aforementioned problems, Tseng and Tsai [32] presented another revocation solution using a public channel in the ID-PKS construction....
[...]
...It is obvious that both the ID-PKS [7] and RID-PKS [32]...
[...]
32 citations
References
7,083 citations
"Efficient Revocable ID-Based Encryp..." refers background or methods or result in this paper
...In both IBEs [8, 20], a secure channel between each user and the PKG must be established to periodically transmit new private keys, thus the PKG and each user need to encrypt and decrypt the new private keys for each time period, respectively....
[...]
...In 2001, Boneh and Franklin [8] suggested a revocation solution, in which users can periodically receive new private keys from the private key generator (PKG)....
[...]
...Since a user’s ID in the IDPKS represents his/her public key, it is not desired to be changed [8]....
[...]
...Some research results for the relationship between security levels and speed of pairing computations on microprocessors were presented in [8, 30]....
[...]
...Such non-degenerate admissible bilinear maps can be obtained from the Weil, Tate or Ate pairings over supersingular elliptic curves or abelian varieties [8, 13, 29]....
[...]
6,902 citations
5,313 citations
"Efficient Revocable ID-Based Encryp..." refers methods in this paper
...We apply the work of Boneh and Franklin [8] to provide a tight security proof in the random model [31, 32]....
[...]
2,188 citations
1,233 citations