Receiver selective opening security for identity-based encryption in the multi-challenge setting.
Zhengan HuangJunzuo LaiGongxian ZengXin MuPublished in: Des. Codes Cryptogr. (2023)
Keyphrases
- identity based encryption
- standard model
- public key
- security model
- encryption scheme
- provably secure
- proxy re encryption
- cca secure
- ciphertext
- public key encryption
- public key cryptosystem
- secret key
- security requirements
- security analysis
- signature scheme
- keyword search
- access control
- key management
- database
- data sharing
- information security
- authentication protocol
- cryptographic protocols
- intrusion detection
- low cost
- relational databases