Login / Signup

Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.

Chengyu HuPengtao LiuShanqing GuoQiuliang Xu
Published in: Int. J. High Perform. Comput. Netw. (2017)
Keyphrases
  • identity based encryption
  • standard model
  • public key
  • security model
  • ciphertext
  • encryption scheme
  • proxy re encryption
  • multiresolution
  • access control
  • secret key
  • key management
  • provably secure
  • cca secure