Full Security: Fuzzy Identity Based Encryption.
Liming FangJinyue XiaPublished in: IACR Cryptol. ePrint Arch. (2008)
Keyphrases
- identity based encryption
- standard model
- public key
- security model
- encryption scheme
- cca secure
- provably secure
- public key encryption
- ciphertext
- proxy re encryption
- security analysis
- public key cryptosystem
- access control
- secret key
- key management
- security requirements
- diffie hellman
- private key
- secret sharing scheme
- information security
- security issues
- database systems
- databases