Revocable hierarchical identity-based encryption with adaptive security.
Kwangsu LeePublished in: Theor. Comput. Sci. (2021)
Keyphrases
- identity based encryption
- standard model
- security model
- public key
- provably secure
- encryption scheme
- cca secure
- proxy re encryption
- ciphertext
- public key encryption
- security analysis
- security requirements
- public key cryptosystem
- access control
- diffie hellman
- private key
- key management
- ring signature scheme
- digital signature
- security mechanisms
- signature scheme
- keyword search
- information security