Last update: Sun Jan 6 02:01:01 MST 2019
@Article{Ishida:2017:CSR, author = "Yuu Ishida and Junji Shikata and Yohei Watanabe", title = "{CCA}-secure revocable identity-based encryption schemes with decryption key exposure resistance", journal = j-INT-J-APPL-CRYPTOGR, volume = "3", number = "3", pages = "288--311", year = "2017", CODEN = "????", DOI = "https://doi.org/10.1504/IJACT.2017.086229", ISSN = "1753-0563 (print), 1753-0571 (electronic)", ISSN-L = "1753-0563", bibdate = "Wed Jan 2 17:53:44 MST 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/ijact.bib", URL = "https://www.inderscienceonline.com//doi/pdf/10.1504/IJACT.2017.086229", acknowledgement = ack-nhfb, fjournal = "International Journal of Applied Cryptography", journal-URL = "http://www.inderscienceonline.com/loi/ijact", keywords = "CCA-security; complete subtree method; composite-order bilinear group; KEM/DEM framework; key encapsulation mechanism; prime-order bilinear group; revocable identity-based encryption", }