Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions.
Sohto ChikuKeitaro HashimotoKeisuke HaraJunji ShikataPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- encryption scheme
- key management
- identity based cryptography
- encryption algorithms
- quantum computation
- security properties
- encryption decryption
- key distribution
- high security
- security analysis
- standard model
- public key
- secret key
- key exchange
- elliptic curve cryptography
- encryption algorithm
- web services
- digital signature
- ad hoc networks
- resource constrained
- provably secure
- identity based encryption
- signcryption scheme
- secret sharing scheme
- iso iec
- signature scheme
- wireless sensor networks
- private key
- secure communication
- diffie hellman
- quantum mechanics
- ciphertext
- elliptic curve
- lossless compression
- data encryption
- security issues
- security policies
- service discovery
- virtual private network
- wireless networks