Practical Hierarchical Identity Based Encryption Scheme without Random Oracles.
Xiaoming HuShangteng HuangXun FanPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2009)
Keyphrases
- encryption scheme
- identity based encryption
- cca secure
- standard model
- ciphertext
- security analysis
- diffie hellman
- provably secure
- public key
- secret key
- proxy re encryption
- secret sharing scheme
- data sharing
- security model
- lossless compression
- signcryption scheme
- hash functions
- public key encryption
- public key cryptosystem
- image processing
- low cost
- multiscale
- private key
- signature scheme
- wavelet transform
- image data
- database systems