Keyphrases
- identity based encryption
- standard model
- public key
- security model
- private key
- encryption scheme
- provably secure
- proxy re encryption
- ciphertext
- cca secure
- public key encryption
- designated verifier
- ring signature scheme
- signature scheme
- security analysis
- secure communication
- access control
- secret key
- public key cryptosystem
- security requirements
- diffie hellman
- keyword search
- key management
- cryptographic protocols
- digital signature
- authentication protocol
- key distribution
- security issues
- hash functions
- relational databases