Login / Signup

Identity-Based Encryption Resilient to Continual Auxiliary Leakage.

Tsz Hon YuenSherman S. M. ChowYe ZhangSiu-Ming Yiu
Published in: EUROCRYPT (2012)
Keyphrases
  • identity based encryption
  • standard model
  • public key
  • security model
  • public key encryption
  • ciphertext
  • provably secure
  • proxy re encryption
  • encryption scheme
  • cca secure
  • access control
  • data access
  • secret key
  • databases