RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures.
Mihir BellareKenneth G. PatersonSusan ThomsonPublished in: ASIACRYPT (2012)
Keyphrases
- encryption scheme
- cca secure
- key management
- encryption algorithms
- security properties
- digital signature
- security analysis
- diffie hellman
- encryption decryption
- standard model
- high security
- ciphertext
- public key
- secret key
- access control
- identity authentication
- identity based encryption
- key exchange
- data encryption
- encryption algorithm
- data sharing
- information security
- public key cryptosystem
- private key
- public key cryptography
- signature verification
- stream cipher
- security issues
- signature scheme
- security mechanisms
- cryptographic protocols
- security model
- lossless compression
- public key infrastructure
- security policies
- elliptic curve cryptography
- cryptographic algorithms
- hash functions
- smart card
- random number
- image encryption
- security protocols
- designated verifier