Revocable IBE Systems with Almost Constant-size Key Update

Download Now
Provided by: Nanyang Technological University
Topic: Security
Format: PDF
It is sometimes necessary to remove keying material from use prior to the end of its normal crypto-period (or key lifetime) for reasons that include key compromise, removal of an entity from an organization, and so on. This process is known as key revocation and is used to explicitly revoke a symmetric key or the public key of a key pair, although the private key associated with the public key is also revoked. Public key revocation in a conventional, certificate-based Public Key Infrastructure (PKI) has been well studied and understood.
Download Now

Find By Topic