Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Takashi KitagawaPeng YangGoichiro HanaokaRui ZhangHajime WatanabeKanta MatsuuraHideki ImaiPublished in: ACISP (2006)
Keyphrases
- identity based encryption
- standard model
- public key
- encryption scheme
- security model
- information security
- cca secure
- public key encryption
- intrusion detection
- ciphertext
- public key cryptosystem
- data model
- security issues
- security requirements
- network security
- canonical correlation analysis
- provably secure
- proxy re encryption
- security policies
- databases
- data integration
- database systems