Relations between semantic security and anonymity in identity-based encryption.
Javier HerranzFabien LaguillaumieCarla RàfolsPublished in: Inf. Process. Lett. (2011)
Keyphrases
- identity based encryption
- standard model
- public key
- security model
- encryption scheme
- public key encryption
- provably secure
- ring signature scheme
- security properties
- cca secure
- network security
- security requirements
- access control
- proxy re encryption
- security policies
- security issues
- public key cryptosystem
- security analysis
- ciphertext
- security mechanisms
- privacy protection
- intrusion detection
- key management
- security protocols
- authentication protocol
- secret key
- signature scheme
- information security
- sensor networks