Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
Yumiko HanaokaGoichiro HanaokaJunji ShikataHideki ImaiPublished in: ASIACRYPT (2005)
Keyphrases
- identity based encryption
- encryption scheme
- key management
- ciphertext
- standard model
- public key
- proxy re encryption
- signature scheme
- digital signature
- hierarchical structure
- security model
- ad hoc networks
- wireless sensor networks
- resource constrained
- secret key
- coarse to fine
- security analysis
- signcryption scheme
- wireless networks