Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security.
Qianqian XingBaosheng WangXiaofeng WangPeixin ChenBo YuYong TangXianming GaoPublished in: HPCC/SmartCity/DSS (2016)
Keyphrases
- identity based encryption
- standard model
- public key
- security model
- encryption scheme
- provably secure
- cca secure
- ciphertext
- public key encryption
- proxy re encryption
- access control
- security analysis
- public key cryptosystem
- security requirements
- information security
- secret key
- signature scheme
- ring signature scheme
- intrusion detection
- key management
- security issues
- security policies
- database