An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Chong Hee KimYong Ho HwangPil Joong LeePublished in: ASIACRYPT (2003)
Keyphrases
- chosen ciphertext
- public key
- standard model
- encryption scheme
- forward secure
- public key encryption scheme
- signcryption scheme
- ciphertext
- secret key
- diffie hellman
- security analysis
- proxy re encryption
- private key
- cca secure
- security model
- public key encryption
- image authentication
- secret sharing scheme
- signature scheme
- authentication scheme
- authentication protocol
- provably secure
- blind signature scheme
- digital signature
- elliptic curve cryptography
- public key cryptosystem
- secure communication
- public key cryptography
- bilinear pairings
- key distribution
- digital images
- key exchange
- secret sharing
- cryptographic protocols
- trusted third party
- key management
- fault tolerant