2015
DOI: 10.1109/tc.2013.208
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Encryption with Outsourced Revocation in Cloud Computing

Abstract: Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional PKI setting, but the cumbersome management of certificates is precisely the burden that IBE strives to alleviate.In this paper, aiming at ta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
104
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 333 publications
(104 citation statements)
references
References 38 publications
0
104
0
Order By: Relevance
“…The private key for the user in traditional IBE schemes [29] is generated by the Private Key Generation Center (PKG). However, in a large scale network, such as s-health, the number of users is huge, and the task of PKG is too heavy and it is difficult to manage the user's private key.…”
Section: Related Workmentioning
confidence: 99%
“…The private key for the user in traditional IBE schemes [29] is generated by the Private Key Generation Center (PKG). However, in a large scale network, such as s-health, the number of users is huge, and the task of PKG is too heavy and it is difficult to manage the user's private key.…”
Section: Related Workmentioning
confidence: 99%
“…computing [21] The researchers separate the encryption and decryption process into two cloud service provider one to Encryption / Decryption and other for Storage without the decryption Key. There is no way for the Storage service to access the users Encrypted data.…”
Section: E Survey On Secure Access and Storage Of Data In Cloudmentioning
confidence: 99%
“…Ghebghoub et al (2014) proposed a security model that gives users a possibility to control security of their data. Li et al (2015) introduced outsourcing computation into identity-based encryption (IBE) and proposed a revocable IBE to tackling the issue of identity revocation. proposed a new secure outsourced attributebased encryption system to support both secure outsourced key-issuing and decryption.…”
Section: Related Workmentioning
confidence: 99%