Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Jian WengShengli LiuKefei ChenChangshe MaPublished in: INDOCRYPT (2006)
Keyphrases
- encryption scheme
- cca secure
- ciphertext
- identity based encryption
- key management
- standard model
- diffie hellman
- provably secure
- security analysis
- public key
- private key
- signature scheme
- encryption algorithm
- signcryption scheme
- public key cryptography
- secret key
- stream cipher
- public key cryptosystem
- proxy re encryption
- security model
- secret sharing scheme
- hash functions
- key distribution
- wireless sensor networks
- identity based cryptography
- lossless compression
- data sharing
- chosen plaintext
- encryption decryption
- encryption algorithms
- high security
- digital signature
- security protocols
- key exchange
- smart card