Circular and KDM Security for Identity-Based Encryption.
Jacob Alperin-SheriffChris PeikertPublished in: Public Key Cryptography (2012)
Keyphrases
- identity based encryption
- standard model
- security model
- encryption scheme
- public key
- public key encryption
- provably secure
- cca secure
- proxy re encryption
- ciphertext
- security issues
- access control
- intrusion detection
- security mechanisms
- security requirements
- security analysis
- private key
- network security
- key management
- secret key
- security policies
- information security