Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
Xu An WangJian WengXiaoyuan YangMinqing ZhangPublished in: J. Syst. Softw. (2011)
Keyphrases
- encryption scheme
- secret key
- identity based encryption
- hash functions
- standard model
- public key
- security analysis
- signature scheme
- ciphertext
- cca secure
- diffie hellman
- secret sharing scheme
- proxy re encryption
- data sharing
- security model
- provably secure
- smart card
- secure communication
- key distribution
- authentication protocol
- public key encryption
- multiresolution
- lossless compression
- signcryption scheme
- similarity search
- forward secure
- image data
- databases