Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Tsz Hon YuenYe ZhangSiu-Ming YiuJoseph K. LiuPublished in: ESORICS (1) (2014)
Keyphrases
- sensor networks
- public key encryption
- identity based encryption
- standard model
- wireless sensor networks
- key establishment
- encryption scheme
- public key
- sensor data
- cca secure
- provably secure
- resource constrained
- key management
- proxy re encryption
- security model
- sensor nodes
- energy consumption
- communication cost
- data streams
- cloud computing
- diffie hellman
- ciphertext
- security analysis
- communication bandwidth
- security requirements
- secret sharing
- public key cryptosystem
- data center
- group communication
- digital signature
- intrusion detection