Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities.
Lihua WangLicheng WangMasahiro MamboEiji OkamotoPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2012)
Keyphrases
- signature scheme
- bilinear pairings
- identity based signature
- proxy signature
- proxy signature scheme
- key distribution
- ciphertext
- standard model
- designated verifier
- secret key
- proxy re encryption
- original signer
- key management
- identity based encryption
- public key
- elliptic curve
- digital signature
- private key
- coarse to fine
- hierarchical structure
- multiscale
- hierarchical model
- diffie hellman
- clustering algorithm