Login / Signup
Continuous Leakage-Resilient Identity-Based Encryption with Tight Security.
Yanwei Zhou
Bo Yang
Hong-xia Hou
Lina Zhang
Tao Wang
Mingxiao Hu
Published in:
Comput. J. (2019)
Keyphrases
</>
identity based encryption
standard model
public key
encryption scheme
security model
public key encryption
provably secure
proxy re encryption
cca secure
ciphertext
information security
security requirements
public key cryptosystem
access control
intrusion detection
information leakage
key management
network security
security analysis
security properties
information systems
secret key
security policies
security mechanisms
private key
databases
signature scheme
data access
search engine