Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption.
Kaitai LiangWilly SusiloJoseph K. LiuDuncan S. WongPublished in: Comput. J. (2015)
Keyphrases
- identity based encryption
- proxy re encryption
- standard model
- provably secure
- cca secure
- security model
- public key
- encryption scheme
- ciphertext
- keyword search
- public key encryption
- signature scheme
- key management
- public key cryptosystem
- secret key
- hash functions
- security analysis
- keywords
- cost effective
- structured data
- lightweight
- relational databases