Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.
Linchao ZhangHua MaZhenhua LiuEnting DongPublished in: BWCCA (2016)
Keyphrases
- security analysis
- encryption scheme
- public key
- proxy signature scheme
- signature scheme
- security requirements
- smart card
- security model
- authentication protocol
- security properties
- standard model
- user authentication
- high security
- ciphertext
- key exchange
- secret key
- information systems
- key distribution
- authentication scheme
- key management
- secret sharing scheme
- private key
- signcryption scheme
- fine grained