A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles.
Kaitai LiangZhen LiuXiao TanDuncan S. WongChunming TangPublished in: ICISC (2012)
Keyphrases
- cca secure
- proxy re encryption
- standard model
- identity based encryption
- ciphertext
- security model
- keyword search
- encryption scheme
- signcryption scheme
- public key
- signature scheme
- secret key
- structured data
- security analysis
- public key cryptosystem
- database systems
- database
- xml data
- access control
- query language
- keywords