Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Bo QinQianhong WuLei ZhangOriol FarràsJosep Domingo-FerrerPublished in: Inf. Sci. (2012)
Keyphrases
- provably secure
- public key encryption
- identity based encryption
- standard model
- proxy re encryption
- ciphertext
- public key
- security model
- signcryption scheme
- encryption scheme
- key management
- diffie hellman
- blind signature
- signature scheme
- blind signature scheme
- security analysis
- cca secure
- private key
- hash functions
- access control
- public key cryptosystem
- security requirements
- digital signature
- secret key
- wireless sensor networks
- data sharing
- end to end