Cryptographic Reverse Firewalls for Identity-Based Encryption.
Yuyang ZhouYuanfeng GuanZhiwei ZhangFagen LiPublished in: FCS (2019)
Keyphrases
- identity based encryption
- public key encryption
- encryption scheme
- standard model
- public key
- provably secure
- proxy re encryption
- cca secure
- security model
- ciphertext
- hash functions
- key management
- packet filtering
- secret key
- security analysis
- network security
- diffie hellman
- smart card
- intrusion detection system
- data sharing
- secure communication
- wireless sensor networks
- digital signature
- cryptographic protocols
- lossless compression
- secret sharing scheme
- computer networks
- intrusion detection
- lightweight