Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks.
Palash SarkarSanjit ChatterjeePublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- identity based encryption
- cryptographic protocols
- provably secure
- standard model
- security model
- secure routing
- security protocols
- public key encryption
- public key
- key management
- cryptographic algorithms
- proxy re encryption
- encryption scheme
- diffie hellman
- cca secure
- security analysis
- key agreement protocol
- authentication protocol
- ciphertext
- hash functions
- signature scheme
- lightweight
- ad hoc networks
- public key cryptosystem
- access control
- key distribution
- security requirements
- security properties
- routing protocol
- secure communication
- multi party
- security mechanisms