Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles.
Yohei WatanabeJunji ShikataPublished in: Public Key Cryptography (1) (2016)
Keyphrases
- ciphertext
- identity based encryption
- encryption scheme
- cca secure
- standard model
- signature scheme
- identity based signature
- secret key
- proxy re encryption
- key management
- public key
- digital signature
- security analysis
- diffie hellman
- private key
- encryption algorithm
- public key cryptosystem
- secret sharing scheme
- provably secure
- signcryption scheme
- hash functions
- low cost
- sensor networks
- security model
- hierarchical clustering