Improved proxy re-encryption schemes with applications to secure distributed storage.
Giuseppe AtenieseKevin FuMatthew GreenSusan HohenbergerPublished in: ACM Trans. Inf. Syst. Secur. (2006)
Keyphrases
- encryption scheme
- distributed storage
- proxy re encryption
- public key encryption
- standard model
- distributed computation
- security model
- security analysis
- cca secure
- diffie hellman
- public key
- ciphertext
- keyword search
- data sharing
- homomorphic encryption
- cloud computing
- secret key
- secret sharing scheme
- storage systems
- database
- key distribution
- data integration
- digital signature
- provably secure
- access control
- privacy preserving
- lossless compression
- relational databases