Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes.
Yi-Fan TsengJheng-Jia HuangHao-Yu YangTsung-Yu ChienChieh-Han WuPublished in: AsiaJCIS (2022)
Keyphrases
- encryption scheme
- secret key
- hash functions
- ciphertext
- standard model
- smart card
- security analysis
- public key
- cca secure
- proxy re encryption
- public key encryption
- forward secure
- key management
- data sharing
- secret sharing scheme
- data management
- encryption key
- digital libraries
- computational complexity
- security model
- similarity search
- s box
- authentication scheme
- homomorphic encryption
- public key cryptosystem
- databases