New Constructions for Identity-Based Unidirectional Proxy Re-Encryption.
Junzuo LaiWen Tao ZhuRobert H. DengShengli LiuWeidong KouPublished in: J. Comput. Sci. Technol. (2010)
Keyphrases
- proxy re encryption
- standard model
- identity based encryption
- ciphertext
- security model
- keyword search
- public key
- public key encryption
- encryption scheme
- signcryption scheme
- cca secure
- signature scheme
- keywords
- access control
- relational databases
- xml data
- security analysis
- secret key
- security requirements
- structured data
- distributed systems