Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Kaitai LiangCheng-Kang ChuXiao TanDuncan S. WongChunming TangJianying ZhouPublished in: Theor. Comput. Sci. (2014)
Keyphrases
- proxy re encryption
- ciphertext
- standard model
- encryption scheme
- multi hop
- public key encryption
- identity based encryption
- cca secure
- diffie hellman
- signcryption scheme
- private key
- wireless sensor networks
- ad hoc networks
- security analysis
- mobile ad hoc networks
- public key
- wireless ad hoc networks
- signature scheme
- wireless networks
- routing protocol
- secret key
- data transmission
- energy consumption
- base station
- provably secure
- routing algorithm
- data sharing
- forward secure
- key management
- security model
- secret sharing scheme
- security protocols
- digital signature
- security properties
- end to end