Entry Ishida:2017:CSR from ijact.bib

Last update: Sun Jan 6 02:01:01 MST 2019                Valid HTML 4.0!

Index sections

Top | Symbols | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | Y | Z

BibTeX entry

@Article{Ishida:2017:CSR,
  author =       "Yuu Ishida and Junji Shikata and Yohei Watanabe",
  title =        "{CCA}-secure revocable identity-based encryption
                 schemes with decryption key exposure resistance",
  journal =      j-INT-J-APPL-CRYPTOGR,
  volume =       "3",
  number =       "3",
  pages =        "288--311",
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1504/IJACT.2017.086229",
  ISSN =         "1753-0563 (print), 1753-0571 (electronic)",
  ISSN-L =       "1753-0563",
  bibdate =      "Wed Jan 2 17:53:44 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/ijact.bib",
  URL =          "https://www.inderscienceonline.com//doi/pdf/10.1504/IJACT.2017.086229",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Applied Cryptography",
  journal-URL =  "http://www.inderscienceonline.com/loi/ijact",
  keywords =     "CCA-security; complete subtree method; composite-order
                 bilinear group; KEM/DEM framework; key encapsulation
                 mechanism; prime-order bilinear group; revocable
                 identity-based encryption",
}

Related entries