ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption.
Qiuxiang DongDijiang HuangJim LuoMyong H. KangPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- access control
- public key
- blind signature
- diffie hellman
- ciphertext
- key distribution
- security model
- blind signature scheme
- key management
- signature scheme
- attribute based encryption
- standard model
- provably secure
- public key cryptography
- access structure
- security policies
- signcryption scheme
- elliptic curve
- encryption scheme
- knn
- video sequences
- secret key
- conflict resolution
- data distribution