Efficient revocable hierarchical identity-based encryption using cryptographic accumulators. Jia, H., Chen, Y., Lan, J., Huang, K., & Wang, J. Int. J. Inf. Sec., 17(4):477-490, 2018. Link Paper bibtex @article{journals/ijisec/JiaCLHW18,
added-at = {2018-07-19T00:00:00.000+0200},
author = {Jia, Hongyong and Chen, Yue and Lan, Julong and Huang, Kaixiang and Wang, Jun},
biburl = {https://www.bibsonomy.org/bibtex/2449900be52d9cae388fa1f3f28e9d6a0/dblp},
ee = {https://doi.org/10.1007/s10207-017-0387-8},
interhash = {f874e8d06dda7cd845408c96fd84c7a2},
intrahash = {449900be52d9cae388fa1f3f28e9d6a0},
journal = {Int. J. Inf. Sec.},
keywords = {dblp},
number = 4,
pages = {477-490},
timestamp = {2018-07-20T11:36:14.000+0200},
title = {Efficient revocable hierarchical identity-based encryption using cryptographic accumulators.},
url = {http://dblp.uni-trier.de/db/journals/ijisec/ijisec17.html#JiaCLHW18},
volume = 17,
year = 2018
}
Downloads: 0
{"_id":"y8C5SJvjrxjb92nTw","bibbaseid":"jia-chen-lan-huang-wang-efficientrevocablehierarchicalidentitybasedencryptionusingcryptographicaccumulators-2018","downloads":0,"creationDate":"2018-08-25T18:21:09.659Z","title":"Efficient revocable hierarchical identity-based encryption using cryptographic accumulators.","author_short":["Jia, H.","Chen, Y.","Lan, J.","Huang, K.","Wang, J."],"year":2018,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/yue chen?items=1000","bibdata":{"bibtype":"article","type":"article","added-at":"2018-07-19T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Jia"],"firstnames":["Hongyong"],"suffixes":[]},{"propositions":[],"lastnames":["Chen"],"firstnames":["Yue"],"suffixes":[]},{"propositions":[],"lastnames":["Lan"],"firstnames":["Julong"],"suffixes":[]},{"propositions":[],"lastnames":["Huang"],"firstnames":["Kaixiang"],"suffixes":[]},{"propositions":[],"lastnames":["Wang"],"firstnames":["Jun"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2449900be52d9cae388fa1f3f28e9d6a0/dblp","ee":"https://doi.org/10.1007/s10207-017-0387-8","interhash":"f874e8d06dda7cd845408c96fd84c7a2","intrahash":"449900be52d9cae388fa1f3f28e9d6a0","journal":"Int. J. Inf. Sec.","keywords":"dblp","number":"4","pages":"477-490","timestamp":"2018-07-20T11:36:14.000+0200","title":"Efficient revocable hierarchical identity-based encryption using cryptographic accumulators.","url":"http://dblp.uni-trier.de/db/journals/ijisec/ijisec17.html#JiaCLHW18","volume":"17","year":"2018","bibtex":"@article{journals/ijisec/JiaCLHW18,\n added-at = {2018-07-19T00:00:00.000+0200},\n author = {Jia, Hongyong and Chen, Yue and Lan, Julong and Huang, Kaixiang and Wang, Jun},\n biburl = {https://www.bibsonomy.org/bibtex/2449900be52d9cae388fa1f3f28e9d6a0/dblp},\n ee = {https://doi.org/10.1007/s10207-017-0387-8},\n interhash = {f874e8d06dda7cd845408c96fd84c7a2},\n intrahash = {449900be52d9cae388fa1f3f28e9d6a0},\n journal = {Int. J. Inf. Sec.},\n keywords = {dblp},\n number = 4,\n pages = {477-490},\n timestamp = {2018-07-20T11:36:14.000+0200},\n title = {Efficient revocable hierarchical identity-based encryption using cryptographic accumulators.},\n url = {http://dblp.uni-trier.de/db/journals/ijisec/ijisec17.html#JiaCLHW18},\n volume = 17,\n year = 2018\n}\n\n","author_short":["Jia, H.","Chen, Y.","Lan, J.","Huang, K.","Wang, J."],"key":"journals/ijisec/JiaCLHW18","id":"journals/ijisec/JiaCLHW18","bibbaseid":"jia-chen-lan-huang-wang-efficientrevocablehierarchicalidentitybasedencryptionusingcryptographicaccumulators-2018","role":"author","urls":{"Link":"https://doi.org/10.1007/s10207-017-0387-8","Paper":"http://dblp.uni-trier.de/db/journals/ijisec/ijisec17.html#JiaCLHW18"},"keyword":["dblp"],"downloads":0},"search_terms":["efficient","revocable","hierarchical","identity","based","encryption","using","cryptographic","accumulators","jia","chen","lan","huang","wang"],"keywords":["dblp"],"authorIDs":[],"dataSources":["XZHajSY3FQzRht7Pv"]}