Fully Secure Unidirectional Identity-Based Proxy Re-encryption.
Song LuoQingni ShenZhong ChenPublished in: ICISC (2011)
Keyphrases
- proxy re encryption
- public key encryption
- standard model
- identity based encryption
- security model
- encryption scheme
- ciphertext
- keyword search
- cca secure
- public key
- signature scheme
- provably secure
- security analysis
- signcryption scheme
- diffie hellman
- security requirements
- private key
- access control
- secret key
- databases
- public key cryptography
- key management
- structured data
- keywords