JOURNAL ARTICLE

Revocable hierarchical identity-based encryption

Jae Hong SeoKeita Emura

Year: 2014 Journal:   Theoretical Computer Science Vol: 542 Pages: 44-62   Publisher: Elsevier BV
Keywords:
Encryption Identity (music) Theoretical computer science Computer science Cryptography Mathematics Algorithm Computer security Philosophy

Metrics

20
Cited By
2.89
FWCI (Field Weighted Citation Impact)
51
Refs
0.93
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
DNA and Biological Computing
Life Sciences →  Biochemistry, Genetics and Molecular Biology →  Molecular Biology

Related Documents

JOURNAL ARTICLE

Revocable hierarchical identity-based broadcast encryption

Dawei LiJianwei LiuZongyang ZhangQianhong WuWeiran Liu

Journal:   Tsinghua Science & Technology Year: 2018 Vol: 23 (5)Pages: 539-549
BOOK-CHAPTER

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption

Jae Hong SeoKeita Emura

Lecture notes in computer science Year: 2015 Pages: 21-38
JOURNAL ARTICLE

Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

Hongyong JiaYue ChenJulong LanHuang KaixiangJun Wang

Journal:   International Journal of Information Security Year: 2017 Vol: 17 (4)Pages: 477-490
JOURNAL ARTICLE

Revocable hierarchical identity-based encryption via history-free approach

Jae Hong SeoKeita Emura

Journal:   Theoretical Computer Science Year: 2015 Vol: 615 Pages: 45-60
© 2026 ScienceGate Book Chapters — All rights reserved.