Certificateless Proxy Re-Encryption Without Pairings.
Kang YangJing XuZhenfeng ZhangPublished in: ICISC (2013)
Keyphrases
- proxy re encryption
- security model
- standard model
- signature scheme
- public key
- provably secure
- public key cryptography
- authentication and key agreement
- access control
- security analysis
- security requirements
- public key encryption
- cca secure
- secret key
- ciphertext
- digital signature
- encryption scheme
- blind signature scheme
- wireless sensor networks
- public key cryptosystem
- information systems