2018
DOI: 10.1109/access.2018.2873019
|View full text |Cite
|
Sign up to set email alerts
|

CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(26 citation statements)
references
References 11 publications
0
26
0
Order By: Relevance
“…They proposed a cloud-assisted, scalable, and revocable identity-based encryption scheme with ciphertext evolution, which can resist collusion attack and CPA, and its ciphertext length is constant. In 2018, Sun et al [23] proposed a CCA secure revocable identity-based encryption scheme with ciphertext evolution in a cloud. The scheme first uses the user's unique identifier as the identity to encrypt data to obtain the first-layer of ciphertext, then uses the identifier combined with the time as the identity to re-encrypt the first-layer ciphertext to obtain the second-layer ciphertext.…”
Section: B Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…They proposed a cloud-assisted, scalable, and revocable identity-based encryption scheme with ciphertext evolution, which can resist collusion attack and CPA, and its ciphertext length is constant. In 2018, Sun et al [23] proposed a CCA secure revocable identity-based encryption scheme with ciphertext evolution in a cloud. The scheme first uses the user's unique identifier as the identity to encrypt data to obtain the first-layer of ciphertext, then uses the identifier combined with the time as the identity to re-encrypt the first-layer ciphertext to obtain the second-layer ciphertext.…”
Section: B Related Workmentioning
confidence: 99%
“…In fact, the firstlayer key corresponding to the user's unique identification remains unchanged, and no real key update is realized. In addition, Wang et al's scheme [22] and Sun et al's scheme [23] utilize identity-based encryption (IBE), not PRE. When the data stored in the cloud need to be accessed by multiple users, different identities are used to encrypt the data and obtain different ciphertexts, which requires numerous storage resources.…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…2) Still, previous cipher texts can access by the revoked user to revocation. [9] In cloud storage, the primary issue is privacy concerns and data security. In multi-user setting, based on the homomorphic encryption, that performed the key word search and provable public key encryption.…”
Section: Literature Surveymentioning
confidence: 99%