Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Jia YuFanyu KongXiangguo ChengRong HaoJianxi FanPublished in: Fundam. Informaticae (2011)
Keyphrases
- forward secure
- standard model
- public key encryption
- threshold signature scheme
- identity based encryption
- proxy re encryption
- signature scheme
- ciphertext
- public key
- provably secure
- encryption scheme
- cca secure
- secret key
- signcryption scheme
- bilinear pairings
- blind signature scheme
- diffie hellman
- digital signature
- hash functions
- secure communication
- security model
- security analysis
- public key cryptography
- query processing