Security Analysis of a fuzzy Identity-Based Encryption Scheme.
Miaomiao TianLiusheng HuangWei YangPublished in: J. Circuits Syst. Comput. (2014)
Keyphrases
- encryption scheme
- security analysis
- identity based encryption
- standard model
- public key
- security model
- ciphertext
- secret sharing scheme
- cca secure
- lossless compression
- data sharing
- authentication protocol
- diffie hellman
- security properties
- secret key
- user authentication
- image encryption
- multiresolution
- key exchange
- encryption algorithm
- signcryption scheme
- data access
- provably secure
- proxy re encryption
- network security
- privacy preserving