A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks.
Ryotaro HayashiTatsuyuki MatsushitaPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- security properties
- secret key
- stream cipher
- security protocols
- diffie hellman
- key distribution
- signature scheme
- cryptographic protocols
- encryption scheme
- digital signature
- chosen plaintext attack
- ciphertext
- private key
- security mechanisms
- standard model
- advanced encryption standard
- public key
- block cipher
- smart card
- pseudorandom
- encryption decryption
- key exchange
- key management
- signcryption scheme
- countermeasures
- cryptographic algorithms
- security analysis
- blind signature scheme
- hash functions
- authentication scheme
- formal model
- digital watermarking
- secure communication
- security services
- information security
- watermarking scheme
- bilinear pairings
- security issues
- security requirements
- resource constrained
- image encryption
- access control
- blind signature
- watermarking algorithm
- encryption algorithms