Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme.
Liqun ChenZhaohui ChengPublished in: IMACC (2005)
Keyphrases
- encryption scheme
- standard model
- security analysis
- cca secure
- diffie hellman
- data sharing
- secret key
- identity based encryption
- public key
- lossless compression
- signcryption scheme
- encryption algorithm
- private key
- ciphertext
- security model
- public key cryptosystem
- proxy re encryption
- public key encryption
- provably secure
- secret sharing scheme
- authentication protocol
- hash functions
- data access
- smart card
- database systems