Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles

نویسندگان

  • Jia Yu
  • Fanyu Kong
  • Xiangguo Cheng
  • Rong Hao
  • Jianxi Fan
چکیده

An incidental error has occurred in the acknowledgment included in the footnote on the front page of the article (page 241). The correct version is presented below. We sincerely apologize to the authors for this inconvenience. We would like to thank Prof. Miroslaw Kutylowski and anonymous reviewers for their helpful suggestions to improve this paper. We also thank Ph. D Xiangfa Guo for his many helpful discussions and contribution to this paper.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles

We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model in groups equipped with a bilinear map. Selective identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in the sta...

متن کامل

A Fully Secure Revocable ID-Based Encryption in the Standard Model

Revocation problem is a critical issue for key management of public key systems. Any certificate-based or identity (ID)-based public key systems must provide a revocation method to revoke misbehaving/compromised users from the public key systems. In the past, there was little work on studying the revocation problem of ID-based public key systems. Most recently, Tseng and Tsai presented a novel ...

متن کامل

Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles

We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our construction uses the recent identity based encryption system of Boneh and Boyen and the chosen ciphertext secure construction of Canetti, Halevi, and Katz.

متن کامل

Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles

Key-insulated encryption is one of the effective solutions to a key exposure problem. Recently, identity-based encryption (IBE) has been used as one of fundamental cryptographic primitives in a wide range of various applications, and it is considered that the identity-based keyinsulated security has a huge influence on the resulting applications. At Asiacrypt’05, Hanaoka et al. proposed an iden...

متن کامل

Identity-Based Revocation from Subset Difference Methods under Simple Assumptions

Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send a ciphertext to a set of receivers. In IBR, a ciphertext is associated with a set of revoked users instead of a set of receivers and the maximum number of users in the system can be an exponential value in the security parameter. In this paper, we reconsider the general method of Lee, Koo, Lee, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Fundam. Inform.

دوره 111  شماره 

صفحات  -

تاریخ انتشار 2011