Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
Shifeng SunDawu GuShengli LiuPublished in: Secur. Commun. Networks (2016)
Keyphrases
- chosen ciphertext
- encryption scheme
- standard model
- identity based encryption
- ciphertext
- provably secure
- private key
- proxy re encryption
- public key
- security analysis
- forward secure
- cca secure
- public key encryption
- diffie hellman
- secret key
- data sharing
- signcryption scheme
- lossless compression
- signature scheme
- secret sharing scheme
- secret sharing
- cost effective
- watermarking scheme
- hash functions