Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications.
David DerlerStephan KrennThomas LorünserSebastian RamacherDaniel SlamanigChristoph StriecksPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- proxy re encryption
- security model
- security analysis
- public key encryption
- security properties
- encryption scheme
- cca secure
- key management
- public key
- standard model
- key distribution
- information security
- security requirements
- private key
- public key cryptosystem
- access control
- intrusion detection
- ciphertext
- diffie hellman
- security issues
- information retrieval
- authentication protocol
- network security
- keyword search
- provably secure