Outsourcing scheme of ABE encryption secure against malicious adversary.
Go OhtakeReihaneh Safavi-NainiLiang Feng ZhangPublished in: Comput. Secur. (2019)
Keyphrases
- ciphertext
- attribute based encryption
- key exchange
- encryption scheme
- security model
- standard model
- private key
- secret key
- security analysis
- authentication scheme
- diffie hellman
- cca secure
- key distribution
- public key
- key management
- access structure
- proxy re encryption
- image encryption
- public key cryptography
- secure communication
- public key encryption
- security properties
- secret sharing scheme
- information technology
- digital signature
- identity based encryption
- provably secure
- data encryption
- high security
- mutual authentication
- stream cipher
- wireless sensor networks
- encryption key
- security requirements
- encryption decryption
- secret sharing
- elliptic curve cryptography
- key management scheme
- smart card
- access control
- authentication protocol
- cryptographic protocols
- information systems
- key establishment
- encryption algorithm
- supply chain
- key agreement protocol
- digital rights management
- elliptic curve
- image authentication