Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme.
Jindan ZhangXu An WangPublished in: INCoS (2012)
Keyphrases
- security analysis
- encryption scheme
- cca secure
- identity based encryption
- security model
- public key
- proxy re encryption
- standard model
- ciphertext
- security properties
- data sharing
- secret sharing scheme
- diffie hellman
- authentication protocol
- signature scheme
- secret key
- signcryption scheme
- public key cryptosystem
- digital signature
- lossless compression
- private key
- similarity search