Login / Signup
Constructions of CCA-Secure Revocable Identity-Based Encryption.
Yuu Ishida
Yohei Watanabe
Junji Shikata
Published in:
ACISP (2015)
Keyphrases
</>
identity based encryption
cca secure
standard model
encryption scheme
public key cryptosystem
public key
ciphertext
proxy re encryption
security model
provably secure
security analysis
data sharing
secret key
secret sharing scheme
image quality
signature scheme
database systems
data management