On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing.
S. Sharmila Deva SelviArinjita PaulC. Pandu RanganPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- security model
- public key cryptography
- provably secure
- authentication and key agreement
- public key cryptosystem
- signature scheme
- security requirements
- blind signature
- intrusion detection
- blind signature scheme
- access control
- public key
- statistical databases
- bilinear pairings
- information security
- security issues
- security problems
- security services
- network security
- security policies
- wireless sensor networks
- security analysis
- data security
- rfid tags
- electronic cash
- designated verifier