On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme.
Jindan ZhangXu An WangPublished in: INCoS (2012)
Keyphrases
- cca secure
- encryption scheme
- public key cryptosystem
- public key encryption scheme
- standard model
- public key
- ciphertext
- forward secure
- identity based encryption
- proxy re encryption
- signature scheme
- secret key
- digital signature
- data sharing
- intrusion detection
- security issues
- security analysis
- access control
- diffie hellman
- information security