Cited by 15
RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE

An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
Changji Wang, Yuan Li, Shengyi Jiang, Jiayuan Wu
Book:  Lecture Notes in Computer Science (Smart Computing and Communication) Volume 10135 (2017), p. 506
Cryptanalysis of a Pairing-based Authentication Scheme for Smart Grid Communications
Yu-Qi Lee, Tsu-Yang Wu, Xiao-Cong Liang, Tao Wang, Chien-Ming Chen, Jerry Chun-Wei Lin, Yeh-Cheng Chen
Book:  Smart Innovation, Systems and Technologies (Advances in Smart Vehicular Technology, Transportation, Communication and Applications) Volume 226 (2021), p. 75
A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Li Tseng
Journal:  International Journal of Distributed Sensor Networks Volume 11, Issue 5 (2015), p. 898716
A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT
Chandrashekhar Meshram, Ahmed Alsanad, Jitendra V. Tembhurne, Shailendra W. Shende, Kailash Wamanrao Kalare, Sarita Gajbhiye Meshram, Muhammad Azeem Akbar, Abdu Gumaei
Journal:  IEEE Access Volume 9 (2021), p. 3649
A brief review of revocable ID-based public key cryptosystem
Tsu-Yang Wu, Jerry Chun-Wei Lin, Chien-Ming Chen, Yuh-Min Tseng, Jaroslav Frnda, Lukas Sevcik, Miroslav Voznak
Journal:  Perspectives in Science Volume 7 (2016), p. 81
A systematic analysis of identity based encryption (IBE)
Aravind Karrothu, Jasmine Norman
Journal:  International Journal of Knowledge-based and Intelligent Engineering Systems Volume 25, Issue 3 (2021), p. 343
Efficient Anonymous Multireceiver Certificateless Encryption
Ying-Hao Hung, Sen-Shan Huang, Yuh-Min Tseng, Tung-Tso Tsai
Journal:  IEEE Systems Journal Volume 11, Issue 4 (2017), p. 2602
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
Hongyong Jia, Yue Chen, Julong Lan, Kaixiang Huang, Jun Wang
Journal:  International Journal of Information Security Volume 17, Issue 4 (2018), p. 477
IIBES: a proposed framework to improve the identity-based encryption system for securing federated learning
Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah, Kamal Gulati
Journal:  International Journal of Pervasive Computing and Communications (2022)
Identity based secure authentication scheme based on quantum key distribution for cloud computing
Geeta Sharma, Sheetal Kalra
Journal:  Peer-to-Peer Networking and Applications Volume 11, Issue 2 (2018), p. 220
Revocable Identity-Based Encryption Scheme Under LWE Assumption in the Standard Model
Yaling Zhang, Shangping Wang, Qing Du
Journal:  IEEE Access Volume 6 (2018), p. 65298
Revocable hierarchical identity-based encryption via history-free approach
Jae Hong Seo, Keita Emura
Journal:  Theoretical Computer Science Volume 615 (2016), p. 45
Secure Certificateless Signature with Revocation in the Standard Model
Tung-Tso Tsai, Sen-Shan Huang, Yuh-Min Tseng
Journal:  Mathematical Problems in Engineering Volume 2014 (2014), p. 1
Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation
Keita EMURA, Jae Hong SEO, Taek-Young YOUN
Journal:  IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Volume E99.A, Issue 1 (2016), p. 83
Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters
Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Muhammad Khurram Khan
Journal:  PLOS ONE Volume 13, Issue 4 (2018), p. e0195204