Identity-Based Encryption with Cloud Revocation Authority and Its Applications.
Yuh-Min TsengTung-Tso TsaiSen-Shan HuangChung-Peng HuangPublished in: IEEE Trans. Cloud Comput. (2018)
Keyphrases
- identity based encryption
- public key
- standard model
- cloud computing
- security model
- security analysis
- encryption scheme
- proxy re encryption
- public key encryption
- provably secure
- ciphertext
- access control
- digital signature
- signature scheme
- public key cryptosystem
- key management
- private key
- secret key
- databases
- diffie hellman
- authentication protocol
- cca secure
- rfid tags
- relational databases