Proxy Re-encryption Scheme from IBE to CBE.
Xu An WangXiaoyuan YangMinqing ZhangPublished in: DBTA (2009)
Keyphrases
- encryption scheme
- proxy re encryption
- standard model
- cca secure
- public key encryption
- security model
- keyword search
- security analysis
- public key
- ciphertext
- identity based encryption
- data sharing
- secret key
- lossless compression
- diffie hellman
- provably secure
- search engine
- practical application
- public key cryptosystem
- data structure
- image processing