Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme.
Seunghwan ParkDong Hoon LeePublished in: IEICE Trans. Inf. Syst. (2016)
Keyphrases
- key management
- signcryption scheme
- ring signature scheme
- encryption scheme
- identity based cryptography
- information security
- security requirements
- cloud computing
- intrusion detection
- blind signature scheme
- key distribution
- identity based signature
- security level
- security issues
- wireless sensor networks
- standard model
- signature scheme
- statistical databases
- security policies
- network security
- authentication and key agreement
- data security
- resource constrained
- secure communication
- security services
- information systems
- web applications
- access control
- bilinear pairings
- ad hoc networks
- big data
- key agreement protocol
- security protocols
- security analysis
- public key