Robust Key-Evolving Public Key Encryption Schemes.
Wen-Guey TzengZhi-Jia TzengPublished in: ICICS (2002)
Keyphrases
- public key
- encryption scheme
- private key
- secure communication
- security analysis
- security model
- public key encryption
- digital signature
- proxy re encryption
- ciphertext
- signature scheme
- diffie hellman
- secret key
- standard model
- public key cryptography
- public key cryptosystem
- authentication scheme
- chosen ciphertext
- authentication protocol
- identity based encryption
- provably secure
- blind signature scheme
- blind signature
- similarity measure