Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience.
Linru ZhangXiangning WangYuechen ChenSiu-Ming YiuPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- key management
- encryption scheme
- key distribution
- ciphertext
- security analysis
- wireless sensor networks
- key management scheme
- key exchange
- secret key
- ad hoc networks
- standard model
- diffie hellman
- public key
- secret sharing scheme
- resource constrained
- private key
- data encryption
- identity based encryption
- integrity verification
- digital signature
- cca secure
- secret sharing
- security properties
- group communication
- encryption algorithms
- secure communication
- security protocols
- provably secure
- stream cipher
- security requirements
- cryptographic protocols
- security model
- elliptic curve