Login / Signup
Identity-Based Proxy Re-encryption Without Random Oracles.
Cheng-Kang Chu
Wen-Guey Tzeng
Published in:
ISC (2007)
Keyphrases
</>
proxy re encryption
ciphertext
standard model
cca secure
identity based encryption
signature scheme
encryption scheme
public key
public key encryption
signcryption scheme
secret key
keyword search
private key
security model
provably secure
diffie hellman
database
security analysis
database systems
information systems