Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security.
Roman LangrehrJiaxin PanPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- identity based encryption
- standard model
- public key
- security model
- encryption scheme
- provably secure
- cca secure
- proxy re encryption
- ciphertext
- public key encryption
- public key cryptosystem
- access control
- security analysis
- security requirements
- signature scheme
- private key
- digital signature
- key management
- secret key
- diffie hellman
- authentication protocol
- cryptographic protocols
- security policies
- hash functions
- network security
- database