Abstract | ||
---|---|---|
In an identity-based encryption (IBE) scheme, how to revoke users from the system is a difficult problem when their private keys are compromised. The private key generator (PKG) updates the private keys for all unrevoked users and has high computation load when a large number of users are included. We propose an IBE scheme with verifiable outsourced revocation based on the one-malicious model of t... |
Year | DOI | Venue |
---|---|---|
2016 | 10.1093/comjnl/bxw029 | The Computer Journal |
Keywords | Field | DocType |
identity-based encryption,revocation,verifiable computation,outsourcing algorithm | Computer science,Computer security,Encryption,Revocation,Theoretical computer science,Verifiable secret sharing | Journal |
Volume | Issue | ISSN |
59 | 11 | 0010-4620 |
Citations | PageRank | References |
3 | 0.41 | 27 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yanli Ren | 1 | 247 | 24.83 |
Ning Ding | 2 | 50 | 8.35 |
Xinpeng Zhang | 3 | 2541 | 174.68 |
Haining Lu | 4 | 12 | 1.96 |
Dawu Gu | 5 | 644 | 103.50 |