Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage.
Hong-xia HouBo YangMingrui ZhangYanwei ZhouMeijuan HuangPublished in: J. Inf. Secur. Appl. (2020)
Keyphrases
- public key encryption
- identity based encryption
- standard model
- encryption scheme
- public key
- provably secure
- cca secure
- security model
- proxy re encryption
- ciphertext
- information leakage
- security analysis
- cryptographic protocols
- diffie hellman
- security requirements
- database systems
- hash functions
- authentication protocol
- key management
- public key cryptosystem
- access control
- similarity measure
- information systems