Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations.
Chien-Lung HsuYu-Li LinTzong-Chen WuChain-Hui SuPublished in: FGIT-FGCN (1) (2010)
Keyphrases
- encryption scheme
- key exchange
- standard model
- public key
- identity based encryption
- security analysis
- authentication scheme
- secret key
- diffie hellman
- signcryption scheme
- data sharing
- proxy re encryption
- ciphertext
- secret sharing scheme
- cca secure
- knowledge management
- database
- public key encryption
- key distribution
- lossless compression
- hash functions
- provably secure
- multiresolution
- multiscale
- image processing