Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Xu An WangJianfeng MaXiaoyuan YangYuechuan WeiPublished in: Trans. Comput. Collect. Intell. (2015)
Keyphrases
- encryption scheme
- security analysis
- multi user
- proxy re encryption
- standard model
- proxy signature scheme
- public key
- ciphertext
- virtual environment
- security model
- virtual world
- augmented reality
- user interface
- security properties
- diffie hellman
- encryption algorithm
- data sharing
- secret key
- identity based encryption
- signcryption scheme
- cca secure
- image encryption
- lossless compression
- secret sharing scheme
- user authentication
- bilinear pairings
- authentication protocol
- authentication scheme
- private key
- security requirements
- provably secure
- quadtree
- wireless networks
- software engineering
- data model