Leakage-resilient certificate-based encryption.
Qihong YuJiguo LiYichen ZhangPublished in: Secur. Commun. Networks (2015)
Keyphrases
- public key infrastructure
- data encryption
- authentication mechanism
- encryption algorithms
- public key cryptography
- random number
- digital signature
- image encryption
- security properties
- identity based encryption
- data confidentiality
- ciphertext
- encryption scheme
- security analysis
- key management
- database systems
- information systems
- neural network
- chaotic sequence
- multimedia streaming
- data sets