Delegation-based conversion from CPA to CCA-secure predicate encryption.
Mridul NandiTapas PanditPublished in: Int. J. Appl. Cryptogr. (2020)
Keyphrases
- cca secure
- encryption scheme
- ciphertext
- public key encryption scheme
- standard model
- security analysis
- secret key
- access control
- public key
- data sharing
- identity based encryption
- secret sharing scheme
- diffie hellman
- proxy re encryption
- conflict resolution
- lossless compression
- security model
- security policies
- private key
- provably secure
- hash functions