Login / Signup
On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations.
Dan Boneh
Periklis A. Papakonstantinou
Charles Rackoff
Yevgeniy Vahlis
Brent Waters
Published in:
FOCS (2008)
Keyphrases
</>
ciphertext
identity based encryption
standard model
proxy re encryption
encryption scheme
cca secure
public key encryption
public key
secret key
provably secure
security model
diffie hellman
private key
database
low cost
data streams
databases