2013
DOI: 10.1093/comjnl/bxt040
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Revocable Certificateless Encryption Secure in the Standard Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(25 citation statements)
references
References 0 publications
0
25
0
Order By: Relevance
“…Let double-struckG1 and double-struckG2 be two multiplicative cyclic groups of large prime order p . An admissible bilinear map ê:double-struckG1×double-struckG1double-struckG2 must satisfy three properties, namely bilinearity, non‐degeneracy, and computability .…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…Let double-struckG1 and double-struckG2 be two multiplicative cyclic groups of large prime order p . An admissible bilinear map ê:double-struckG1×double-struckG1double-struckG2 must satisfy three properties, namely bilinearity, non‐degeneracy, and computability .…”
Section: Preliminariesmentioning
confidence: 99%
“…Thus, the CL‐PKS construction solves the key escrow problem and retains the merit of eliminating the required certificates. The research on CL‐PKSs has undergone quite rapidly, and a large number of papers have been presented .…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Tseng and Tsai [10] presented the revocation method using public channel. In addition, two primitives (encryption and signature) in revocable certificateless public-key cryptography (RCL-PKC) were also proposed, such as revocable certificateless public-key encryption (RCL-PKE) schemes [11,12] and revocable certificateless signature (RCLS) scheme [13,14]. Furthermore, Hung et al [15] presented a short RCLS scheme.…”
Section: Introductionmentioning
confidence: 99%