New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks.
Lihua WangLicheng WangMasahiro MamboEiji OkamotoPublished in: Pairing (2010)
Keyphrases
- chosen ciphertext
- encryption scheme
- proxy re encryption
- standard model
- signcryption scheme
- bilinear pairings
- ciphertext
- identity based encryption
- security analysis
- chosen plaintext attack
- public key
- security model
- signature scheme
- cca secure
- diffie hellman
- keyword search
- public key encryption
- secret key
- lossless compression
- data sharing
- key distribution
- encryption algorithm
- forward secure
- hash functions
- cryptographic protocols
- access control