Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability.
Xiaolei WangYang WangMingqiang WangPublished in: WASA (1) (2022)
Keyphrases
- proxy re encryption
- ciphertext
- encryption scheme
- identity based encryption
- standard model
- security properties
- security analysis
- public key encryption
- secret key
- security model
- public key
- cca secure
- keyword search
- diffie hellman
- provably secure
- databases
- data sharing
- hash functions
- secret sharing scheme
- private key
- information retrieval