Ring-Based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security.
Parhat AblaFeng-Hao LiuHan WangZhedong WangPublished in: TCC (3) (2021)
Keyphrases
- identity based encryption
- standard model
- security model
- encryption scheme
- public key encryption
- public key
- provably secure
- cca secure
- proxy re encryption
- ciphertext
- security analysis
- security policies
- security issues
- upper bound
- security requirements
- information security
- access control
- security properties
- intrusion detection
- public key cryptosystem
- network security
- key management
- formal model
- cost effective