2022
DOI: 10.1007/978-981-19-2894-9_38
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Direct and Immediate User Revocable Attribute-Based Encryption Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 14 publications
0
0
0
Order By: Relevance
“…The proposed scheme supports also the direct and immediate user revocation mechanisms from [22]. The key features of this scheme are the validity times applicable to the key, the revocation list (RL) and the immediate revocation list (IRL).…”
Section: Proposed Roh-tbac Scheme Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed scheme supports also the direct and immediate user revocation mechanisms from [22]. The key features of this scheme are the validity times applicable to the key, the revocation list (RL) and the immediate revocation list (IRL).…”
Section: Proposed Roh-tbac Scheme Overviewmentioning
confidence: 99%
“…If the validity period is expired, the ciphertext is not decrypted. The time period is represented using a tree that is similar to that shown in [22].…”
Section: Proposed Roh-tbac Scheme Overviewmentioning
confidence: 99%