Keyphrases
- standard model
- signcryption scheme
- signature scheme
- hash functions
- identity based signature
- encryption scheme
- identity based encryption
- proxy re encryption
- ciphertext
- provably secure
- similarity search
- bilinear pairings
- forward secure
- peer to peer
- threshold signature scheme
- public key
- secret key
- diffie hellman
- blind signature
- databases
- identity based cryptography