Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG.
Jindan ZhangXu An WangXiaoyuan YangPublished in: J. Comput. (2013)
Keyphrases
- proxy re encryption
- identity based encryption
- private key
- ciphertext
- standard model
- public key
- security model
- encryption scheme
- keyword search
- cca secure
- public key encryption
- signature scheme
- signcryption scheme
- security analysis
- secret key
- relational databases
- diffie hellman
- key distribution
- secret sharing scheme
- keywords
- information systems
- databases