Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
Yumiko HanaokaGoichiro HanaokaJunji ShikataHideki ImaiPublished in: IACR Cryptol. ePrint Arch. (2004)
Keyphrases
- encryption scheme
- identity based encryption
- key management
- ciphertext
- standard model
- public key
- security analysis
- secret key
- identity based signature
- security model
- data sharing
- hierarchical structure
- neural network
- resource constrained
- coarse to fine
- ad hoc networks
- secret sharing scheme
- encryption algorithm
- key exchange
- provably secure
- proxy re encryption
- database