Keyphrases
- identity based encryption
- standard model
- public key
- security model
- provably secure
- proxy re encryption
- encryption scheme
- ciphertext
- public key encryption
- cca secure
- key technologies
- signature scheme
- secret key
- security analysis
- database
- public key cryptosystem
- security requirements
- access control
- image quality
- database systems