Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Yevgeniy DodisNelly FazioPublished in: Public Key Cryptography (2003)
Keyphrases
- chosen ciphertext
- public key
- encryption scheme
- standard model
- forward secure
- public key encryption scheme
- ciphertext
- signcryption scheme
- secret key
- security analysis
- proxy re encryption
- diffie hellman
- private key
- security model
- public key encryption
- public key cryptography
- cca secure
- secret sharing scheme
- signature scheme
- digital signature
- authentication scheme
- authentication protocol
- provably secure
- image authentication
- blind signature scheme
- elliptic curve cryptography
- public key cryptosystem
- secret sharing
- blind signature
- trusted third party
- secure communication
- bilinear pairings
- cryptographic protocols
- data sharing
- hash functions
- user authentication