A Compatible Implementation between Identity-based and Certificateless Encryption Schemes.
Antigoni PolychroniadouKonstantinos ChalkiasGeorge StephanidesPublished in: WEBIST (2012)
Keyphrases
- encryption scheme
- signature scheme
- public key
- security model
- standard model
- provably secure
- identity based encryption
- security analysis
- ciphertext
- secret key
- authentication and key agreement
- proxy re encryption
- public key cryptosystem
- bilinear pairings
- secret sharing scheme
- signcryption scheme
- diffie hellman
- public key cryptography
- data sharing
- secret sharing
- hash functions
- blind signature scheme
- databases
- lossless compression
- cca secure
- access control