A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

[PDF][PDF] An overview of independent component analysis and its applications

GR Naik, DK Kumar - Informatica, 2011 - informatica.si
The problem of source separation is an inductive inference problem. There is not enough
information to deduce the solution, so one must use any available information to infer the …

Identity-based encryption with outsourced revocation in cloud computing

J Li, J Li, X Chen, C Jia, W Lou - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Identity-Based Encryption (IBE) which simplifies the public key and certificate management
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …

Identity-based encryption with efficient revocation

A Boldyreva, V Goyal, V Kumar - … of the 15th ACM conference on …, 2008 - dl.acm.org
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE
eliminates the need for a Public Key Infrastructure (PKI). The senders using an IBE do not …

Certificate-based encryption and the certificate revocation problem

C Gentry - International Conference on the Theory and …, 2003 - Springer
We introduce the notion of certificate-based encryption. In this model, a certificate—or, more
generally, a signature—acts not only as a certificate but also as a decryption key. To decrypt …

Mediated ciphertext-policy attribute-based encryption and its application

L Ibraimi, M Petkovic, S Nikova, P Hartel… - … Workshop, WISA 2009 …, 2009 - Springer
Abstract In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is
associated with a set of attributes, and the ciphertext is associated with an access policy …

Revocable identity-based encryption revisited: Security model and construction

JH Seo, K Emura - Public-Key Cryptography–PKC 2013: 16th International …, 2013 - Springer
Abstract In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an
Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE) …

Adaptive-ID secure revocable identity-based encryption

B Libert, D Vergnaud - Topics in Cryptology–CT-RSA 2009: The …, 2009 - Springer
Abstract Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled
encryption as it eliminates the need for digital certificates. While revocation has been …

Server-aided revocable attribute-based encryption

H Cui, RH Deng, Y Li, B Qin - … : 21st European Symposium on Research in …, 2016 - Springer
As a one-to-many public key encryption system, attribute-based encryption (ABE) enables
scalable access control over encrypted data in cloud storage services. However, efficient …

Public key encryption with secure key leasing

S Agrawal, F Kitagawa, R Nishimaki, S Yamada… - … Conference on the …, 2023 - Springer
We introduce the notion of public key encryption with secure key leasing (PKE-SKL). Our
notion supports the leasing of decryption keys so that a leased key achieves the decryption …