Keyphrases
- identity based encryption
- lower bound
- standard model
- security model
- intrusion detection
- access control
- public key
- information security
- security issues
- security policies
- upper bound
- encryption scheme
- provably secure
- network security
- security mechanisms
- proxy re encryption
- security requirements
- security properties
- ciphertext
- wireless sensor networks
- query processing