SCIENCE CHINA Information Sciences, Volume 63 , Issue 3 : 139110(2020) https://doi.org/10.1007/s11432-018-9455-5

Space efficient revocable IBE for mobile devices in cloud computing

More info
  • ReceivedMar 15, 2018
  • AcceptedMay 17, 2018
  • PublishedFeb 11, 2020


There is no abstract available for this article.


This work was supported by National Natural Science Foundation of China (Grant No. 61502400, 61702105), Foundation of Sichuan Educational Committee (Grant No. 16ZB0140), and National Joint Fund of China (Grant No. U1636209).


Appendixes A and B.


[1] Seo J H, Emura K. Revocable identity-based encryption revisited: security model and construction. In: Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, 2013. 216--234. Google Scholar

[2] Boldyreva A, Goyal V, Kumar V. Identity-based encryption with efficient revocation. In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, Alexandria, 2008. 417--426. Google Scholar

[3] Watanabe Y, Emura K, Seo J H. New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters. In: Proceedings of The Cryptographers' Track at the RSA Conference, San Francisco, 2017. 432--449. Google Scholar

[4] Lin H, Cao Z, Fang Y, et al. How to design space efficient revocable IBE from non-monotonic ABE In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, 2011. 381--385. Google Scholar

[5] Qin B D, Deng R H, Li Y J, et al. Server-aided revocable identity-based encryption. In: Proceedings of the 20th European Symposium on Research in Computer Security, Vienna, 2015. 286--304. Google Scholar

[6] Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, Alexandria, 2007. 195--203. Google Scholar

[7] De Caro A, Iovino V. jpbc: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, Kerkyra, 2011. 850--855. Google Scholar