Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption

Provided by: International Association for Cryptologic Research
Topic: Security
Format: PDF
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted by hacking or the period of a contract expires. In the public key infrastructure setting, numerous solutions have been proposed, and in the Identity Based Encryption (IBE) setting, a recent series of papers proposed revocable IBE schemes. Delegation of key generation is also an important functionality in cryptography from a practical standpoint since it allows reduction of excessive workload for a single key generation authority.

Find By Topic