Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities.
Lihua WangLicheng WangMasahiro MamboEiji OkamotoPublished in: ICICS (2010)
Keyphrases
- signature scheme
- bilinear pairings
- identity based signature
- proxy signature
- key distribution
- proxy re encryption
- ciphertext
- proxy signature scheme
- public key
- original signer
- key management
- elliptic curve
- neural network
- private key
- identity based encryption
- standard model
- encryption scheme
- hierarchical model
- secret key
- coarse to fine
- public key cryptosystems
- provably secure
- signcryption scheme
- diffie hellman
- designated verifier
- hierarchical clustering