Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2018
DOI: 10.1109/tcc.2016.2541138
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
31
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 32 publications
(34 citation statements)
references
References 23 publications
1
31
0
Order By: Relevance
“…We remark that in our scheme, only operations of scalar multiplication in G and exponentiation in G T are involved in the encryption process, and there is no time-consuming operation such as bilinear pairings or map-to-hash operations. We also observe that in Li et al, 27 the encryption process is significantly faster than the decryption process, while in Tseng et al, 28 the result is just the opposite. In our scheme, however, the performance of encryption and decryption is approximately equal and encryption is slightly faster than decryption.…”
Section: Performance Evaluationmentioning
confidence: 52%
See 4 more Smart Citations
“…We remark that in our scheme, only operations of scalar multiplication in G and exponentiation in G T are involved in the encryption process, and there is no time-consuming operation such as bilinear pairings or map-to-hash operations. We also observe that in Li et al, 27 the encryption process is significantly faster than the decryption process, while in Tseng et al, 28 the result is just the opposite. In our scheme, however, the performance of encryption and decryption is approximately equal and encryption is slightly faster than decryption.…”
Section: Performance Evaluationmentioning
confidence: 52%
“…The computation costs of a single identity key generation and time key update are similar since the operations in these 2 procedures are almost identical in each scheme, respectively. For identity key generation or time key update process, Li et al scheme 27 requires 3TG m + T e (6.834 ms), and Tseng et al scheme 28 requires TG H + TG m (7.865 ms), while our scheme requires only T m (2.165 ms). Schemes in Li et al 27 (123.544 ms).…”
Section: Performance Evaluationmentioning
confidence: 94%
See 3 more Smart Citations