Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks.
Shifeng SunDawu GuZhengan HuangPublished in: Comput. J. (2015)
Keyphrases
- information leakage
- public key encryption
- identity based encryption
- block cipher
- public key
- standard model
- security mechanisms
- secure communication
- security protocols
- private key
- encryption scheme
- cryptographic protocols
- provably secure
- security requirements
- diffie hellman
- proxy re encryption
- security model
- security issues
- access control
- group communication
- wireless sensor networks
- authentication protocol
- security analysis
- cca secure
- data distribution