The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes.
Antigoni PolychroniadouKonstantinos ChalkiasGeorge StephanidesPublished in: SECRYPT (2012)
Keyphrases
- encryption scheme
- signature scheme
- public key
- standard model
- provably secure
- security model
- authentication and key agreement
- public key cryptography
- identity based encryption
- proxy re encryption
- secret key
- ciphertext
- security analysis
- bilinear pairings
- session key
- diffie hellman
- signcryption scheme
- hash functions
- blind signature
- data sharing
- blind signature scheme
- digital signature
- key management
- cca secure
- public key encryption
- public key cryptosystem
- peer to peer
- private key
- key agreement protocol
- secret sharing scheme