Search Results 1-8 of 8

  • Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology

    OHARA Kazuma , EMURA Keita , HANAOKA Goichiro , ISHIDA Ai , OHTA Kazuo , SAKAI Yusuke

    … Our technique, which we call parallel Boneh-Boyen-Shacham group signature technique, helps to construct an R-GS scheme without following the technique used in LPY, i.e., we directly apply the Naor-Naor-Lotspiech framework without using any identity-based encryption.</p> …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A(9), 1101-1117, 2019

    J-STAGE 

  • Generic Constructions for Fully Secure Revocable Attribute-Based Encryption

    YAMADA Kotoko , ATTRAPADUNG Nuttapong , EMURA Keita , HANAOKA Goichiro , TANAKA Keisuke

    … <p>Attribute-based encryption (ABE), a cryptographic primitive, realizes fine-grained access control. … Because of its attractive functionality, many systems based on ABE have been constructed to date. … In such cryptographic systems, revocation functionality is indispensable to handle withdrawal of users, secret key exposure, and others. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A(9), 1456-1472, 2018

    J-STAGE 

  • Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme

    PARK Seunghwan , LEE Dong Hoon

    … Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. … proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. …

    IEICE Transactions on Information and Systems E99.D(7), 1933-1936, 2016

    J-STAGE 

  • A Variant of Park-Lee Identity-Based Encryption System

    PARK Jong Hwan , LEE Dong Hoon

    … Recently, Park and Lee suggested a new framework for realizing Identity-Based Encryption (IBE) trapdoor called 'two-equation-revocation', and proposed a new IBE system that makes use of a Map-To-Point hash function. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E99.A(3), 720-732, 2016

    J-STAGE 

  • Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation

    EMURA Keita , SEO Jae Hong , YOUN Taek-Young

    … Boneh and Franklin considered to add the revocation functionality to identity-based encryption (IBE). … Moreover, we construct a prototype RHIBE scheme based on the decisional bilinear Diffie-Hellman (DBDH) assumption. … Since our prototype RHIBE provides history-free update, insider security, and decryption key exposure resistance, our construction yields the first RHIBE scheme based on the static assumption with these desirable properties. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E99.A(1), 83-91, 2016

    J-STAGE 

  • A Remark on “ Efficient Revocable ID-Based Encryption with a Public Channel”

    SEO Jae Hong , EMURA Keita

    … In 2001, Boneh and Franklin realized the first Identity-Based Encryption (IBE), and at the same time they proposed a simple way to revoke users from the system. … pointed out that Boneh-Franklin's revocation method is not scalable well and they proposed the first IBE scheme with efficient revocation. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96.A(11), 2282-2285, 2013

    J-STAGE 

  • How to Deal with Key Exposure in Identity-Based Schemes

    HANAOKA Yumiko , HANAOKA Goichiro , SHIKATA Junji , IMAI Hideki

    … In this paper, we study revocation of private keys in identity-based schemes. …

    Technical report of IEICE. ISEC 102(323), 83-90, 2002-09-13

    References (17)

  • Revocable and Renewable ID-based Key Distribution System for User's Secret Information

    OKAMOTO Takeshi , OKAMOTO Eiji , TADA Mitsuru , KAMACHI Ken'ichiro

    … In this paper, a new identity-based key distribution system(ID-KDS)is proposed. … After revocation and renewal of a user's secret information, the center can use the same ID, which has been used before. …

    Technical report of IEICE. ISEC 98(464), 1-11, 1998-12-10

    References (12)

Page Top