Revocable and Traceable Decentralized ABE for P2P Networks [PDF]
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology provides fine-grained access control capabilities for P2P networks. However, its long-term development has been constrained by three major challenges: the trade-off between computational ...
Dan Gao, Huanhuan Xu, Shuqu Qian
doaj +2 more sources
Legal and Jurisprudential Analysis of the views of the Guardian Council and the procedure of the Administrative Justice Court about Extending the Effect of Revocation to the Time of ratification [PDF]
Although recognizing the jurisdiction of the revocation of regulation contrary to the law or the Sharia in article 170 for the Administrative Justice court, the effect of the revocation has some ambiguities.
Mohamad Amin Abrishami rad
doaj +1 more source
The Study of Legality of Intentional Revocation of Unilateral Acts of States in International Law [PDF]
The One of the main issues in the legal regimes is the intentional revocation of any kind of obligations. This revocation means that obligant party terminates its duty merely at the request of that party.
Siamak Karimi
doaj +1 more source
Certificate Revocation Schemes in Vehicular Networks: A Survey
The problem of security in vehicular networks is a vital issue and attracts researchers' increasing attention for its unique characteristics, such as the vulnerability of wireless media, untrusted communication environment, and closely relationship with ...
Qianpeng Wang, Deyun Gao, Du Chen
doaj +1 more source
The nature of Revocation and it's distinction from similar concepts [PDF]
Revocation is one of the important legal institutions that beside institutions like right of option, and right to rescind allow people that by means of that cancel their previous actions and revoke of them.
حامد خسروی +2 more
doaj +1 more source
Indirect Revocable KP-ABE With Revocation Undoing Resistance
Lately, many cloud-based applications proposed Attribute-Based Encryption (ABE) as an all-in-one solution for achieving confidentiality and access control. Within this paradigm, data producers store the encrypted data on a semi-trusted cloud server, and users, holding decryption keys issued by a key authority, can decrypt data according to some access ...
Rasori, Marco +3 more
openaire +2 more sources
An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem
Supporting users to transact with websites securely in a privacy-preserving manner has become more challenging than ever in the web ecosystem based on public key infrastructures.
Diana Gratiela Berbecaru, Antonio Lioy
doaj +1 more source
Server-aided immediate and robust user revocation mechanism for SM9
As the only approved Identity-Based Encryption scheme in China that is also standardized by ISO, SM9-IBE has been widely adopted in many real-world applications.
Shuzhou Sun +3 more
doaj +1 more source
Revocable Signature Scheme with Implicit and Explicit Certificates
This paper addresses the certificate revocation problem and proposes the first revocable pairing-based signature scheme with implicit and explicit certificates (IE-RCBS-kCAA).
Jerzy Pejaś +2 more
doaj +1 more source
Backward Compatible Identity-Based Encryption
In this paper, we present a new identity-based encryption (IBE) system that is named Backward Compatible Identity-based Encryption (BC-IBE). Our BC-IBE is proposed to solve the problem caused by the out-of-synchronization between users’ private keys and ...
Jongkil Kim
doaj +1 more source

