A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme.
Arinjita PaulVarshika SrinivasavaradhanS. Sharmila Deva SelviC. Pandu RanganPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- cca secure
- encryption scheme
- identity based encryption
- ciphertext
- standard model
- public key encryption scheme
- proxy re encryption
- public key cryptosystem
- public key
- security analysis
- signature scheme
- provably secure
- data sharing
- secret key
- security model
- diffie hellman
- lossless compression
- secret sharing scheme
- keyword search
- signcryption scheme
- hash functions
- digital images
- digital signature
- private key
- high dimensional
- key management