Unbounded HIBE with Tight Security.
Roman LangrehrJiaxin PanPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- identity based encryption
- security requirements
- information security
- security model
- public key
- access control
- lower bound
- security issues
- upper bound
- encryption scheme
- security policies
- network security
- image compression
- wavelet transform
- database
- cost effective
- intrusion detection
- security analysis
- security properties
- proxy re encryption
- databases