A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture.
Tomasz HylaJerzy PejasPublished in: CISIM (2013)
Keyphrases
- security architecture
- security model
- identity based encryption
- encryption scheme
- proxy re encryption
- public key
- public key encryption
- standard model
- security analysis
- cca secure
- ciphertext
- access control
- security requirements
- provably secure
- secret key
- diffie hellman
- databases
- signature scheme
- data sharing
- hash functions
- database design
- data structure