2015
DOI: 10.1007/s10623-015-0039-9
|View full text |Cite
|
Sign up to set email alerts
|

Self-updatable encryption with short public parameters and its extensions

Abstract: Cloud storage is very popular since it has many advantages, but there is a new threat to cloud storage that was not considered before. Self-updatable encryption that updates a past ciphertext to a future ciphertext by using a public key is a new cryptographic primitive introduced by Lee, Choi, Lee, Park, and Yung (Asiacrypt 2013) to defeat this threat, in which an adversary who obtained a past private key can still decrypt a (previously unread) past ciphertext stored in cloud storage. Additionally, an SUE sche… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 20 publications
(41 citation statements)
references
References 28 publications
(63 reference statements)
0
41
0
Order By: Relevance
“…As in [10], [9], we use a full binary tree T to represent time in our SUE scheme by assigning time periods to all tree nodes. In the full binary tree T , each node (internal node or leaf node) is assigned a unique time value by using pre-order tree traversal that recursively visits the root node, the left subtree, and the right subtree; i.e., the root node of T is associated with 0 time value and the right most leaf node of T is associated with 2 dmax+1 − 2 time value where d max is the maximum depth of the tree.…”
Section: Managing the Time Structurementioning
confidence: 99%
See 4 more Smart Citations
“…As in [10], [9], we use a full binary tree T to represent time in our SUE scheme by assigning time periods to all tree nodes. In the full binary tree T , each node (internal node or leaf node) is assigned a unique time value by using pre-order tree traversal that recursively visits the root node, the left subtree, and the right subtree; i.e., the root node of T is associated with 0 time value and the right most leaf node of T is associated with 2 dmax+1 − 2 time value where d max is the maximum depth of the tree.…”
Section: Managing the Time Structurementioning
confidence: 99%
“…Table 1 and 2 present the comparison between our fully secure SUE scheme and that of [10], the only SUE scheme with full security available in the literature, in terms of communication together with storage and computation respectively. The other previously known SUE schemes, viz., the prime order constructions of [10], [9] are only selectively secure and hence we do not consider them for efficiency comparison. Let us first concentrate on the communication and …”
Section: Lemma 5 If There Exists An Adversarymentioning
confidence: 99%
See 3 more Smart Citations