ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption.
Danfeng YaoNelly FazioYevgeniy DodisAnna LysyanskayaPublished in: IACR Cryptol. ePrint Arch. (2004)
Keyphrases
- encryption scheme
- key management
- encryption algorithms
- security properties
- encryption decryption
- diffie hellman
- security analysis
- key exchange
- public key
- encryption algorithm
- standard model
- high security
- data encryption
- public key cryptography
- secret key
- elliptic curve cryptography
- image encryption
- identity authentication
- ciphertext
- digital signature
- bilinear pairings
- virtual private network
- key distribution
- private key
- signature scheme
- digital rights management
- blind signature
- data confidentiality
- wireless sensor networks
- integrity verification
- data sharing
- provably secure
- security model
- blind signature scheme
- stream cipher
- signcryption scheme
- advanced encryption standard
- data security
- mutual authentication
- secret sharing scheme
- cryptographic protocols
- security requirements
- information hiding
- random number
- formal model
- secret sharing