Continuous Leakage-Resilient Identity-Based Encryption with Tight Security.
Yanwei ZhouBo YangHong-xia HouLina ZhangTao WangMingxiao HuPublished in: Comput. J. (2019)
Keyphrases
- identity based encryption
- standard model
- public key
- encryption scheme
- security model
- public key encryption
- provably secure
- proxy re encryption
- cca secure
- ciphertext
- information security
- security requirements
- public key cryptosystem
- access control
- intrusion detection
- information leakage
- key management
- network security
- security analysis
- security properties
- information systems
- secret key
- security policies
- security mechanisms
- private key
- databases
- signature scheme
- data access
- search engine