Delegate and Verify the Update Keys of Revocable Identity-Based Encryption.
Kwangsu LeePublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- identity based encryption
- standard model
- public key
- security model
- ciphertext
- provably secure
- proxy re encryption
- encryption scheme
- cca secure
- public key encryption
- secret key
- security analysis
- signature scheme
- key management
- public key cryptosystem
- database systems
- database
- keyword search
- private key
- diffie hellman
- access control
- information extraction
- high dimensional
- information systems