Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority.
Yuh-Min TsengSen-Shan HuangTung-Tso TsaiYun-Hsin ChuangYing-Hao HungPublished in: Informatica (2022)
Keyphrases
- public key cryptography
- public key
- authentication and key agreement
- elliptic curve
- digital signature
- provably secure
- third party
- security model
- public key infrastructure
- security services
- modular exponentiation
- bilinear pairings
- signature scheme
- key management
- service providers
- smart card
- security analysis
- public key cryptosystem
- standard model
- ring signature scheme