A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme.
Jiguo LiMeilin TengYichen ZhangQihong YuPublished in: Comput. J. (2016)
Keyphrases
- encryption scheme
- cca secure
- identity based encryption
- public key encryption scheme
- standard model
- security analysis
- ciphertext
- public key
- secret key
- data sharing
- diffie hellman
- signcryption scheme
- lossless compression
- security model
- secret sharing scheme
- public key cryptosystem
- proxy re encryption
- databases
- digital signature
- private key
- provably secure
- hash functions