Downgradable Identity-Based Encryption and Applications.
Olivier BlazyPaul GermoutyDuong Hieu PhanPublished in: CT-RSA (2019)
Keyphrases
- identity based encryption
- standard model
- public key
- proxy re encryption
- security model
- provably secure
- encryption scheme
- cca secure
- ciphertext
- public key encryption
- security analysis
- signature scheme
- secret key
- keyword search
- access control
- public key cryptosystem
- information systems
- security requirements
- diffie hellman
- wavelet transform
- knn
- data sources
- database systems