Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
نویسندگان
چکیده
An incidental error has occurred in the acknowledgment included in the footnote on the front page of the article (page 241). The correct version is presented below. We sincerely apologize to the authors for this inconvenience. We would like to thank Prof. Miroslaw Kutylowski and anonymous reviewers for their helpful suggestions to improve this paper. We also thank Ph. D Xiangfa Guo for his many helpful discussions and contribution to this paper.
منابع مشابه
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model in groups equipped with a bilinear map. Selective identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in the sta...
متن کاملA Fully Secure Revocable ID-Based Encryption in the Standard Model
Revocation problem is a critical issue for key management of public key systems. Any certificate-based or identity (ID)-based public key systems must provide a revocation method to revoke misbehaving/compromised users from the public key systems. In the past, there was little work on studying the revocation problem of ID-based public key systems. Most recently, Tseng and Tsai presented a novel ...
متن کاملChosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our construction uses the recent identity based encryption system of Boneh and Boyen and the chosen ciphertext secure construction of Canetti, Halevi, and Katz.
متن کاملIdentity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
Key-insulated encryption is one of the effective solutions to a key exposure problem. Recently, identity-based encryption (IBE) has been used as one of fundamental cryptographic primitives in a wide range of various applications, and it is considered that the identity-based keyinsulated security has a huge influence on the resulting applications. At Asiacrypt’05, Hanaoka et al. proposed an iden...
متن کاملIdentity-Based Revocation from Subset Difference Methods under Simple Assumptions
Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send a ciphertext to a set of receivers. In IBR, a ciphertext is associated with a set of revoked users instead of a set of receivers and the maximum number of users in the system can be an exponential value in the security parameter. In this paper, we reconsider the general method of Lee, Koo, Lee, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Fundam. Inform.
دوره 111 شماره
صفحات -
تاریخ انتشار 2011