Efficient revocable hierarchical identity-based encryption using cryptographic accumulators. Jia, H., Chen, Y., Lan, J., Huang, K., & Wang, J. International Journal of Information Security, 17(4):477–490, August, 2018.
Paper doi bibtex @Article{Jia:2018:ERH,
author = "Hongyong Jia and Yue Chen and Julong Lan and Kaixiang
Huang and Jun Wang",
title = "Efficient revocable hierarchical identity-based
encryption using cryptographic accumulators",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "477--490",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0387-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0387-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
Downloads: 0
{"_id":"y8C5SJvjrxjb92nTw","bibbaseid":"jia-chen-lan-huang-wang-efficientrevocablehierarchicalidentitybasedencryptionusingcryptographicaccumulators-2018","downloads":0,"creationDate":"2018-08-25T18:21:09.659Z","title":"Efficient revocable hierarchical identity-based encryption using cryptographic accumulators","author_short":["Jia, H.","Chen, Y.","Lan, J.","Huang, K.","Wang, J."],"year":2018,"bibtype":"article","biburl":"ftp.math.utah.edu/pub/tex/bib/intjinfosec.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Hongyong"],"propositions":[],"lastnames":["Jia"],"suffixes":[]},{"firstnames":["Yue"],"propositions":[],"lastnames":["Chen"],"suffixes":[]},{"firstnames":["Julong"],"propositions":[],"lastnames":["Lan"],"suffixes":[]},{"firstnames":["Kaixiang"],"propositions":[],"lastnames":["Huang"],"suffixes":[]},{"firstnames":["Jun"],"propositions":[],"lastnames":["Wang"],"suffixes":[]}],"title":"Efficient revocable hierarchical identity-based encryption using cryptographic accumulators","journal":"International Journal of Information Security","volume":"17","number":"4","pages":"477–490","month":"August","year":"2018","coden":"????","doi":"https://doi.org/10.1007/s10207-017-0387-8","issn":"1615-5262 (print), 1615-5270 (electronic)","issn-l":"1615-5262","bibdate":"Wed Jul 25 08:53:56 MDT 2018","bibsource":"https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib","url":"http://link.springer.com/article/10.1007/s10207-017-0387-8","acknowledgement":"Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \\path|beebe@math.utah.edu|, \\path|beebe@acm.org|, \\path|beebe@computer.org| (Internet), URL: \\path|https://www.math.utah.edu/ beebe/|","fjournal":"International Journal of Information Security","journal-url":"https://link.springer.com/journal/10207","bibtex":"@Article{Jia:2018:ERH,\n author = \"Hongyong Jia and Yue Chen and Julong Lan and Kaixiang\n Huang and Jun Wang\",\n title = \"Efficient revocable hierarchical identity-based\n encryption using cryptographic accumulators\",\n journal = j-INT-J-INFO-SEC,\n volume = \"17\",\n number = \"4\",\n pages = \"477--490\",\n month = aug,\n year = \"2018\",\n CODEN = \"????\",\n DOI = \"https://doi.org/10.1007/s10207-017-0387-8\",\n ISSN = \"1615-5262 (print), 1615-5270 (electronic)\",\n ISSN-L = \"1615-5262\",\n bibdate = \"Wed Jul 25 08:53:56 MDT 2018\",\n bibsource = \"https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;\n https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib\",\n URL = \"http://link.springer.com/article/10.1007/s10207-017-0387-8\",\n acknowledgement = ack-nhfb,\n fjournal = \"International Journal of Information Security\",\n journal-URL = \"https://link.springer.com/journal/10207\",\n}\n\n","author_short":["Jia, H.","Chen, Y.","Lan, J.","Huang, K.","Wang, J."],"key":"Jia:2018:ERH","id":"Jia:2018:ERH","bibbaseid":"jia-chen-lan-huang-wang-efficientrevocablehierarchicalidentitybasedencryptionusingcryptographicaccumulators-2018","role":"author","urls":{"Paper":"http://link.springer.com/article/10.1007/s10207-017-0387-8"},"metadata":{"authorlinks":{}},"downloads":0,"html":""},"search_terms":["efficient","revocable","hierarchical","identity","based","encryption","using","cryptographic","accumulators","jia","chen","lan","huang","wang"],"keywords":[],"authorIDs":[],"dataSources":["XZHajSY3FQzRht7Pv","fEXH7XH8oyBtpzKFi"]}