ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption.
Danfeng YaoNelly FazioYevgeniy DodisAnna LysyanskayaPublished in: CCS (2004)
Keyphrases
- encryption scheme
- key management
- encryption algorithms
- public key
- security properties
- encryption decryption
- security analysis
- public key cryptography
- encryption algorithm
- diffie hellman
- identity authentication
- elliptic curve cryptography
- standard model
- high security
- private key
- key exchange
- data encryption
- digital signature
- ciphertext
- digital rights management
- data confidentiality
- virtual private network
- secret key
- elliptic curve
- blind signature
- data sharing
- secret sharing scheme
- data protection
- security model
- authentication scheme
- provably secure
- key distribution
- wireless sensor networks
- key agreement
- hash functions
- image encryption
- cryptographic protocols
- lossless compression
- security requirements
- signcryption scheme
- stream cipher
- network security
- ad hoc networks
- secret sharing
- resource constrained
- security protocols
- secure communication
- mutual authentication
- public key infrastructure
- information security
- integrity verification