Leakage-resilient identity-based encryption scheme.
Sujuan LiFutai ZhangPublished in: Int. J. Grid Util. Comput. (2013)
Keyphrases
- encryption scheme
- standard model
- security analysis
- data sharing
- identity based encryption
- ciphertext
- public key
- secret key
- secret sharing scheme
- diffie hellman
- lossless compression
- signcryption scheme
- proxy re encryption
- cca secure
- database
- security model
- public key encryption
- hash functions
- motion estimation
- data streams
- data structure
- databases