IoT device security based on proxy re-encryption.
Su-Hyun KimIm-Yeong LeePublished in: J. Ambient Intell. Humaniz. Comput. (2018)
Keyphrases
- proxy re encryption
- security model
- public key encryption
- security problems
- security requirements
- encryption scheme
- standard model
- cca secure
- access control
- identity based encryption
- security analysis
- keyword search
- key management
- public key
- information security
- security mechanisms
- ciphertext
- provably secure
- network security
- computer networks
- database
- data integrity
- intrusion detection
- security policies
- virtual private network
- rfid tags
- structured data
- lightweight
- security issues