Mergeable and Revocable Identity-Based Encryption.
Shengmin XuGuomin YangYi MuWilly SusiloPublished in: ACISP (1) (2017)
Keyphrases
- identity based encryption
- standard model
- public key
- security model
- provably secure
- encryption scheme
- proxy re encryption
- ciphertext
- public key encryption
- cca secure
- secret key
- security analysis
- algebraic operators
- diffie hellman
- key management
- digital signature
- security requirements
- database systems
- database
- signature scheme
- hash functions
- access control
- databases