Revocable hierarchical identity-based encryption with shorter private keys and update keys.
Kwangsu LeeSeunghwan ParkPublished in: Des. Codes Cryptogr. (2018)
Keyphrases
- identity based encryption
- standard model
- public key
- provably secure
- security model
- ciphertext
- proxy re encryption
- encryption scheme
- public key encryption
- cca secure
- secret key
- hash functions
- signature scheme
- databases
- security analysis
- private key
- authentication protocol
- key management
- end to end
- access control
- search engine