Verifiability-based conversion from CPA to CCA-secure predicate encryption.
Mridul NandiTapas PanditPublished in: Appl. Algebra Eng. Commun. Comput. (2018)
Keyphrases
- cca secure
- encryption scheme
- ciphertext
- public key encryption scheme
- security analysis
- standard model
- security properties
- secret key
- identity based encryption
- diffie hellman
- public key
- data sharing
- proxy re encryption
- public key cryptosystem
- secret sharing scheme
- hash functions
- secret sharing
- lossless compression
- relational databases