Login / Signup
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Jiguo Li
Yuyan Guo
Qihong Yu
Yang Lu
Yichen Zhang
Published in:
Secur. Commun. Networks (2016)
Keyphrases
</>
provably secure
identity based encryption
standard model
security model
key management
public key
hash functions
signature scheme
proxy re encryption
security analysis
diffie hellman
security requirements
resource constrained
information systems
access control
key distribution
low cost
high dimensional