Login / Signup

Generalised key delegation for hierarchical identity-based encryption.

Michel AbdallaEike KiltzGregory Neven
Published in: IET Inf. Secur. (2008)
Keyphrases
  • identity based encryption
  • standard model
  • low cost
  • public key
  • proxy re encryption
  • encryption scheme
  • databases
  • relational databases
  • access control
  • data integration
  • security model