2019
DOI: 10.1007/978-3-030-17253-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Broadcast Encryption with Efficient Revocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…Firstly, Alice will communicate with PKG and obtains master public key for the encryption purpose. For generating the master private key, PKG uses Alice's personal information and timestamp as another parameter [5,6]. PKG authenticates Alice first, and then, Alice receives master private key.…”
Section: Introductionmentioning
confidence: 99%
“…Firstly, Alice will communicate with PKG and obtains master public key for the encryption purpose. For generating the master private key, PKG uses Alice's personal information and timestamp as another parameter [5,6]. PKG authenticates Alice first, and then, Alice receives master private key.…”
Section: Introductionmentioning
confidence: 99%
“…Because the computational complexity depends on the number of receivers, the scheme has huge overhead. Ge et al [32] improved the performance of traditional broadcast encryption and realized effective revocation management for members in S. Only users who have not been revoked can decrypt the ciphertext. However, due to the use of attributebased encryption, the computation cost is relatively large.…”
Section: Related Workmentioning
confidence: 99%
“…Abe et al [20] put forward to a more efficient tag-KEM/DEM scheme. Then, many KEM/ DEM schemes [21][22][23][24][25][26][27][28] have been proposed. These designs support both components modular design.…”
Section: Related Workmentioning
confidence: 99%