How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes.
JoongHyo OhKyungKeun LeeSang-Jae MoonPublished in: ICISS (2005)
Keyphrases
- encryption scheme
- public key
- private key
- ciphertext
- identity based encryption
- standard model
- public key cryptography
- proxy re encryption
- security analysis
- secret key
- signature scheme
- secure communication
- security model
- data sharing
- key management
- encryption key
- secret sharing scheme
- diffie hellman
- key distribution
- hash functions
- cca secure
- access control
- third party
- data integration
- signcryption scheme
- smart card
- digital signature
- multiresolution
- compression ratio
- blind signature
- lossless compression