Identity-based Public Key Cryptographic Primitive with Delegated Equality Test Against Insider Attack in Cloud Computing.
Seth AlornyoAcheampong Edward MensahAbraham Opanfo AbbamPublished in: Int. J. Netw. Secur. (2020)
Keyphrases
- cloud computing
- public key
- encryption scheme
- secret key
- ciphertext
- signature scheme
- public key cryptography
- digital signature
- key management
- authentication protocol
- security analysis
- identity based encryption
- public key encryption
- standard model
- signcryption scheme
- elliptic curve cryptography
- smart card
- blind signature scheme
- secure communication
- encryption algorithm
- proxy re encryption
- data management
- security model
- bilinear pairings
- private key
- service providers
- hash functions
- diffie hellman
- key distribution
- provably secure
- public key cryptosystem
- secret sharing scheme
- s box
- session key
- cca secure
- blind signature
- data sharing
- elliptic curve
- distributed environment
- security issues
- rfid tags