Sign in
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles.
Yanli Ren
Dawu Gu
Published in:
J. Syst. Softw. (2010)
Keyphrases
</>
cca secure
identity based encryption
encryption scheme
ciphertext
standard model
public key encryption scheme
public key cryptosystem
proxy re encryption
security analysis
public key
secret key
diffie hellman
signature scheme
lossless compression
secret sharing scheme
signcryption scheme