A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
[PDF][PDF] An overview of independent component analysis and its applications
The problem of source separation is an inductive inference problem. There is not enough
information to deduce the solution, so one must use any available information to infer the …
information to deduce the solution, so one must use any available information to infer the …
Identity-based encryption with outsourced revocation in cloud computing
Identity-Based Encryption (IBE) which simplifies the public key and certificate management
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE
eliminates the need for a Public Key Infrastructure (PKI). The senders using an IBE do not …
eliminates the need for a Public Key Infrastructure (PKI). The senders using an IBE do not …
Certificate-based encryption and the certificate revocation problem
C Gentry - International Conference on the Theory and …, 2003 - Springer
We introduce the notion of certificate-based encryption. In this model, a certificate—or, more
generally, a signature—acts not only as a certificate but also as a decryption key. To decrypt …
generally, a signature—acts not only as a certificate but also as a decryption key. To decrypt …
Mediated ciphertext-policy attribute-based encryption and its application
Abstract In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is
associated with a set of attributes, and the ciphertext is associated with an access policy …
associated with a set of attributes, and the ciphertext is associated with an access policy …
Revocable identity-based encryption revisited: Security model and construction
Abstract In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an
Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE) …
Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE) …
Adaptive-ID secure revocable identity-based encryption
Abstract Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled
encryption as it eliminates the need for digital certificates. While revocation has been …
encryption as it eliminates the need for digital certificates. While revocation has been …
Server-aided revocable attribute-based encryption
As a one-to-many public key encryption system, attribute-based encryption (ABE) enables
scalable access control over encrypted data in cloud storage services. However, efficient …
scalable access control over encrypted data in cloud storage services. However, efficient …
Public key encryption with secure key leasing
We introduce the notion of public key encryption with secure key leasing (PKE-SKL). Our
notion supports the leasing of decryption keys so that a leased key achieves the decryption …
notion supports the leasing of decryption keys so that a leased key achieves the decryption …