Login / Signup
Practical continuous leakage-resilient CCA secure identity-based encryption.
Yanwei Zhou
Bo Yang
Published in:
Frontiers Comput. Sci. (2020)
Keyphrases
</>
identity based encryption
cca secure
standard model
encryption scheme
public key
proxy re encryption
ciphertext
public key cryptosystem
security model
provably secure
keyword search
secret key
security analysis
diffie hellman
hash functions
private key