Revocable Hierarchical Identity-Based Encryption with Adaptive Security.
Kwangsu LeePublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- identity based encryption
- standard model
- public key
- security model
- encryption scheme
- provably secure
- proxy re encryption
- cca secure
- ciphertext
- public key encryption
- access control
- security analysis
- secret key
- public key cryptosystem
- security requirements
- information security
- key management
- keyword search
- ring signature scheme
- authentication protocol
- databases
- signature scheme
- private key
- diffie hellman
- relational databases