Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Jian WengShengli LiuKefei ChenDong ZhengWeidong QiuPublished in: CT-RSA (2008)
Keyphrases
- ciphertext
- encryption scheme
- signcryption scheme
- standard model
- cca secure
- signature scheme
- identity based encryption
- proxy re encryption
- public key
- key management
- digital signature
- private key
- secret key
- diffie hellman
- security analysis
- provably secure
- threshold signature scheme
- cryptographic protocols
- wireless sensor networks
- forward secure
- secret sharing scheme
- identity based cryptography
- key distribution
- security model
- roc curve
- data sharing