@inproceedings{72e4151255804c52a3bfc85c4ec06010,
title = "Revocable identity-based encryption from lattices",
abstract = "In this paper, we present an identity-based encryption (IBE) scheme from lattices with efficient key revocation. We adopt multiple trapdoors from the Agrawal-Boneh-Boyen and Gentry-Peikerty-Vaikuntanathan lattice IBE schemes to realize key revocation, which in turn, makes use of binary-tree data structure. Using our scheme, key update requires logarithmic complexity in the maximal number of users and linear in the number of revoked users for the relevant key authority. We prove that our scheme is selective secure in the standard model and under the LWE assumption, which is as hard as the worst-case approximating short vectors on arbitrary lattices.",
keywords = "Identity-based Encryption, Key Revocation, Lattice-based Cryptography",
author = "Jie Chen and Lim, {Hoon Wei} and San Ling and Huaxiong Wang and Khoa Nguyen",
year = "2012",
doi = "10.1007/978-3-642-31448-3_29",
language = "English",
isbn = "9783642314476",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "390--403",
editor = "Willy Susilo and Yi Mu and Jennifer Seberry",
booktitle = "Information Security and Privacy",
address = "United States",
note = "17th Australasian Conference on Information Security and Privacy, ACISP 2012 ; Conference date: 09-07-2012 Through 11-07-2012",
}