Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles.
Yanli RenDawu GuShuozhong WangXinpeng ZhangPublished in: Int. J. Found. Comput. Sci. (2010)
Keyphrases
- proxy re encryption
- identity based encryption
- ciphertext
- standard model
- cca secure
- encryption scheme
- provably secure
- public key encryption
- signature scheme
- security model
- public key
- keyword search
- secret key
- diffie hellman
- public key cryptosystem
- signcryption scheme
- access control
- security analysis
- private key
- public key cryptography
- forward secure
- image compression
- distributed systems