JOURNAL ARTICLE

Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

Hongyong JiaYue ChenJulong LanHuang KaixiangJun Wang

Year: 2017 Journal:   International Journal of Information Security Vol: 17 (4)Pages: 477-490   Publisher: Springer Science+Business Media
Keywords:
Computer science Encryption Cryptography Revocation Public-key cryptography Broadcast encryption Computer security Key (lock) Theoretical computer science Computer network Overhead (engineering)

Metrics

4
Cited By
0.69
FWCI (Field Weighted Citation Impact)
17
Refs
0.76
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Complexity and Algorithms in Graphs
Physical Sciences →  Computer Science →  Computational Theory and Mathematics

Related Documents

JOURNAL ARTICLE

Revocable hierarchical identity-based encryption

Jae Hong SeoKeita Emura

Journal:   Theoretical Computer Science Year: 2014 Vol: 542 Pages: 44-62
JOURNAL ARTICLE

Revocable hierarchical identity-based broadcast encryption

Dawei LiJianwei LiuZongyang ZhangQianhong WuWeiran Liu

Journal:   Tsinghua Science & Technology Year: 2018 Vol: 23 (5)Pages: 539-549
BOOK-CHAPTER

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption

Jae Hong SeoKeita Emura

Lecture notes in computer science Year: 2015 Pages: 21-38
JOURNAL ARTICLE

Revocable hierarchical identity-based encryption via history-free approach

Jae Hong SeoKeita Emura

Journal:   Theoretical Computer Science Year: 2015 Vol: 615 Pages: 45-60
© 2026 ScienceGate Book Chapters — All rights reserved.