Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
Man Ho AuJoseph K. LiuTsz Hon YuenDuncan S. WongPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- identity based encryption
- standard model
- signature scheme
- public key
- provably secure
- cca secure
- threshold signature scheme
- ciphertext
- proxy re encryption
- public key cryptosystem
- digital signature
- forward secure
- diffie hellman
- encryption scheme
- private key
- security analysis
- security model
- secret key
- public key cryptography
- blind signature
- signcryption scheme
- blind signature scheme
- bilinear pairings
- key management
- xml documents
- ring signature
- quadtree