Security vulnerability in a non-interactive ID-based proxy re-encryption scheme.
Woo Kwon KooJung Yeon HwangDong Hoon LeePublished in: Inf. Process. Lett. (2009)
Keyphrases
- security vulnerabilities
- ring signature scheme
- blind signature scheme
- blind signature
- encryption scheme
- risk assessment
- buffer overflow
- intrusion detection
- key management
- signcryption scheme
- key distribution
- key agreement
- information security
- access control
- diffie hellman
- signature scheme
- penetration testing
- security model
- security issues
- provably secure
- security risks
- statistical databases
- information systems
- computer graphics
- denial of service
- denial of service attacks
- standard model
- secret key
- security threats
- risk management
- private key
- intrusion detection system
- virtual reality
- authentication protocol
- privacy preserving
- user interaction
- security requirements