Login / Signup
Hierarchical Identity Based Encryption with Constant Size Ciphertext.
Dan Boneh
Xavier Boyen
Eu-Jin Goh
Published in:
IACR Cryptol. ePrint Arch. (2005)
Keyphrases
</>
identity based encryption
ciphertext
standard model
public key
proxy re encryption
security model
encryption scheme
cca secure
provably secure
secret key
public key encryption
access control
keyword search
public key cryptosystem
databases
secret sharing scheme