On the security of the hierarchical attribute based encryption scheme proposed by Wang et al.
Mohammad AliJavad MohajeriMohammad-Reza SadeghiPublished in: CoRR (2018)
Keyphrases
- encryption scheme
- identity based encryption
- security analysis
- cca secure
- diffie hellman
- standard model
- public key
- ciphertext
- security model
- public key encryption
- encryption algorithm
- secret key
- hash functions
- lossless compression
- data sharing
- provably secure
- image processing
- private key
- image encryption
- proxy re encryption
- encryption key
- public key cryptosystem
- image compression
- multiresolution
- similarity measure