Provably secure certificate-based encryption with leakage resilience.
Yuyan GuoJiguo LiYang LuYichen ZhangFutai ZhangPublished in: Theor. Comput. Sci. (2018)
Keyphrases
- provably secure
- identity based encryption
- key management
- public key cryptography
- standard model
- public key
- security model
- encryption scheme
- hash functions
- signature scheme
- blind signature
- blind signature scheme
- bilinear pairings
- ciphertext
- diffie hellman
- fault tolerance
- ad hoc networks
- digital signature
- resource constrained
- secret key
- security analysis
- cca secure
- wireless networks
- fault tolerant
- information security