On Use of Identity-Based Encryption for Secure Emailing.
Christian VeignerChunming RongPublished in: SECRYPT (2006)
Keyphrases
- public key encryption
- identity based encryption
- standard model
- public key
- encryption scheme
- security model
- provably secure
- proxy re encryption
- cca secure
- ciphertext
- diffie hellman
- security analysis
- secret key
- signature scheme
- security requirements
- security issues
- information systems
- database
- key management
- secret sharing
- databases