Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions.
Yi LuKeisuke HaraKeisuke TanakaPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2021)
Keyphrases
- identity based encryption
- cca secure
- public key encryption
- standard model
- encryption scheme
- proxy re encryption
- public key
- public key cryptosystem
- ciphertext
- security model
- provably secure
- keyword search
- security analysis
- diffie hellman
- secret key
- databases
- digital signature
- network security
- multiresolution
- database systems