A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption.
David GalindoPublished in: ICCSA (3) (2006)
Keyphrases
- identity based encryption
- standard model
- public key
- security model
- encryption scheme
- public key encryption
- provably secure
- cca secure
- ciphertext
- proxy re encryption
- information security
- security policies
- security analysis
- security requirements
- signature scheme
- security issues
- access control
- public key cryptosystem
- secret key
- database systems
- diffie hellman
- intrusion detection
- rfid tags