Chosen-ciphertext attack secure public key encryption with auxiliary inputs.
Zongyang ZhangZhenfu CaoHaifeng QianPublished in: Secur. Commun. Networks (2012)
Keyphrases
- chosen ciphertext
- public key encryption
- encryption scheme
- standard model
- proxy re encryption
- ciphertext
- public key
- identity based encryption
- security analysis
- secret key
- cca secure
- diffie hellman
- data sharing
- security model
- hash functions
- provably secure
- secret sharing scheme
- public key cryptosystem
- secret sharing
- signature scheme
- digital signature
- lossless compression
- private key
- public key cryptography
- signcryption scheme
- forward secure
- database
- data access