CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System.
Yu ChenZongyang ZhangDongdai LinZhenfu CaoPublished in: Comput. J. (2014)
Keyphrases
- cca secure
- encryption scheme
- hash functions
- identity based encryption
- ciphertext
- standard model
- public key encryption scheme
- proxy re encryption
- security analysis
- secret key
- signcryption scheme
- public key
- security model
- signature scheme
- similarity search
- secret sharing scheme
- public key cryptosystem
- diffie hellman
- provably secure
- databases
- data sharing
- lossless compression
- structured data
- authentication protocol
- power consumption
- digital images