Identity-Based Encryption with Verifiable Outsourced Revocation.
Yanli RenNing DingXinpeng ZhangHaining LuDawu GuPublished in: Comput. J. (2016)
Keyphrases
- identity based encryption
- public key
- security model
- standard model
- access control
- third party
- provably secure
- encryption scheme
- security analysis
- secret key
- public key encryption
- key management
- secret sharing
- ciphertext
- digital signature
- proxy re encryption
- signature scheme
- secure communication
- key distribution
- public key cryptosystem
- cca secure
- rfid tags
- diffie hellman
- similarity measure
- databases