Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary.
Go OhtakeReihaneh Safavi-NainiLiang Feng ZhangPublished in: ICISSP (2017)
Keyphrases
- ciphertext
- attribute based encryption
- standard model
- encryption scheme
- cca secure
- public key encryption
- security analysis
- proxy re encryption
- key exchange
- private key
- security model
- public key
- secret key
- access structure
- secure communication
- authentication scheme
- public key cryptography
- encryption algorithm
- mutual authentication
- key management
- information technology
- encryption key
- stream cipher
- high security
- identity based encryption
- data encryption
- security properties
- diffie hellman
- digital signature
- key distribution
- secret sharing scheme
- authentication protocol
- secret sharing
- provably secure
- elliptic curve cryptography
- key management scheme
- security requirements
- cryptographic protocols
- smart card
- pseudorandom
- information systems
- signature scheme
- integrity verification
- image encryption