Security Proof for Shengbao Wang's Identity-Based Encryption Scheme.
Sunder LalPriyam SharmaPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- encryption scheme
- security analysis
- standard model
- ciphertext
- diffie hellman
- cca secure
- public key
- data sharing
- security model
- identity based encryption
- encryption algorithm
- secret key
- signcryption scheme
- hash functions
- provably secure
- secret sharing scheme
- public key encryption
- lossless compression
- private key
- homomorphic encryption
- public key cryptosystem
- similarity measure
- key exchange
- proxy re encryption
- low cost