Identity-based Hierarchical Key-insulated Encryption without Random Oracles.
Yohei WatanabeJunji ShikataPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- ciphertext
- identity based encryption
- encryption scheme
- cca secure
- standard model
- signature scheme
- identity based signature
- provably secure
- key management
- public key
- digital signature
- proxy re encryption
- secret key
- private key
- diffie hellman
- encryption algorithm
- public key cryptosystem
- data sharing
- security analysis
- threshold signature scheme
- secret sharing scheme
- security model
- signcryption scheme
- hash functions
- coarse to fine
- hierarchical model
- bilinear pairings
- hierarchical structure