Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.
Yanwei ZhouZhaolong WangZirui QiaoYing WangBo YangYi MuMingwu ZhangPublished in: Comput. J. (2023)
Keyphrases
- identity based encryption
- standard model
- security model
- public key encryption
- public key
- encryption scheme
- information security
- security issues
- intrusion detection
- database
- canonical correlation analysis
- provably secure
- information leakage
- wireless networks
- security mechanisms
- access control
- authentication protocol
- data management
- proxy re encryption
- similarity measure
- information systems