Efficient revocable hierarchical identity-based encryption using cryptographic accumulators. Jia, H., Chen, Y., Lan, J., Huang, K., & Wang, J. International Journal of Information Security, 17(4):477–490, August, 2018.
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators [link]Paper  doi  bibtex   
@Article{Jia:2018:ERH,
  author =       "Hongyong Jia and Yue Chen and Julong Lan and Kaixiang
                 Huang and Jun Wang",
  title =        "Efficient revocable hierarchical identity-based
                 encryption using cryptographic accumulators",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "477--490",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0387-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0387-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

Downloads: 0