An object oriented approach to an identity based encryption cryptosystem.
Adam DuffyTom DowlingPublished in: IASTED Conf. on Software Engineering and Applications (2004)
Keyphrases
- identity based encryption
- cca secure
- ciphertext
- public key cryptosystem
- public key
- standard model
- encryption scheme
- proxy re encryption
- public key encryption
- private key
- signature scheme
- secret key
- digital signature
- diffie hellman
- provably secure
- security model
- database
- security analysis
- databases
- authentication protocol
- lightweight