(Hierarchical) Identity-Based Encryption from Affine Message Authentication.
Olivier BlazyEike KiltzJiaxin PanPublished in: CRYPTO (1) (2014)
Keyphrases
- identity based encryption
- standard model
- public key
- public key encryption
- security model
- security analysis
- proxy re encryption
- encryption scheme
- provably secure
- ciphertext
- private key
- cca secure
- authentication protocol
- security requirements
- sensor networks
- digital watermarking
- public key cryptosystem
- signature scheme
- power consumption